0000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) socket(0x10, 0x400000000080803, 0x0) 20:31:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x206, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:31:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x0, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:31:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f3646023443", 0x32}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:31:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x0, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:31:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x0, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1744.085758][ T1469] FS-Cache: Duplicate cookie detected [ 1744.091513][ T1469] FS-Cache: O-cookie c=00000000bd074d49 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1744.100553][ T1469] FS-Cache: O-cookie d=00000000f201baff n=0000000013e96e6b [ 1744.107851][ T1469] FS-Cache: O-key=[10] '0200020000807f000008' [ 1744.114241][ T1469] FS-Cache: N-cookie c=0000000008aa26cd [p=0000000049888e43 fl=2 nc=0 na=1] [ 1744.123037][ T1469] FS-Cache: N-cookie d=00000000f201baff n=00000000f4c2bfda [ 1744.130373][ T1469] FS-Cache: N-key=[10] '0200020000807f000008' 20:31:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f3646023443", 0x32}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:31:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x207, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:31:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x0, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:31:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f3646023443", 0x32}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:31:52 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x208, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:31:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x0, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) [ 1744.770894][ T1826] FS-Cache: Duplicate cookie detected [ 1744.776438][ T1826] FS-Cache: O-cookie c=00000000cb8bda27 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1744.785542][ T1826] FS-Cache: O-cookie d=00000000f201baff n=000000006709c122 [ 1744.793012][ T1826] FS-Cache: O-key=[10] '0200020000807f000008' [ 1744.799327][ T1826] FS-Cache: N-cookie c=00000000e7e750fe [p=0000000049888e43 fl=2 nc=0 na=1] [ 1744.808117][ T1826] FS-Cache: N-cookie d=00000000f201baff n=00000000f27127fd [ 1744.815428][ T1826] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) socket(0x10, 0x400000000080803, 0x0) 20:32:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0x0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f3646", 0x2f}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:32:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x209, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0x0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x0, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f3646", 0x2f}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1753.553657][ T2049] FS-Cache: Duplicate cookie detected [ 1753.559345][ T2049] FS-Cache: O-cookie c=000000006df67280 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1753.568729][ T2049] FS-Cache: O-cookie d=00000000f201baff n=00000000205209c8 [ 1753.575991][ T2049] FS-Cache: O-key=[10] '0200020000807f000008' [ 1753.582362][ T2049] FS-Cache: N-cookie c=00000000ae548624 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1753.591168][ T2049] FS-Cache: N-cookie d=00000000f201baff n=000000000e38662f [ 1753.598550][ T2049] FS-Cache: N-key=[10] '0200020000807f000008' [ 1753.604848][ T2051] FS-Cache: Duplicate cookie detected [ 1753.610453][ T2051] FS-Cache: O-cookie c=000000006df67280 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1753.619525][ T2051] FS-Cache: O-cookie d=00000000f201baff n=00000000205209c8 [ 1753.626820][ T2051] FS-Cache: O-key=[10] '0200020000807f000008' [ 1753.633355][ T2051] FS-Cache: N-cookie c=00000000c00dc376 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1753.642220][ T2051] FS-Cache: N-cookie d=00000000f201baff n=00000000ea88999f [ 1753.649659][ T2051] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x20a, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0x0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x20b, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f3646", 0x2f}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:32:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0x0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) socket(0x10, 0x400000000080803, 0x0) 20:32:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x20c, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0x0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0x0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:10 executing program 4: 20:32:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0x0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1762.929450][ T2609] FS-Cache: Duplicate cookie detected [ 1762.934963][ T2609] FS-Cache: O-cookie c=0000000011eea998 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1762.944195][ T2609] FS-Cache: O-cookie d=00000000f201baff n=00000000a0584ec6 [ 1762.951664][ T2609] FS-Cache: O-key=[10] '0200020000807f000008' [ 1762.958194][ T2609] FS-Cache: N-cookie c=0000000032e86dac [p=0000000049888e43 fl=2 nc=0 na=1] [ 1762.967050][ T2609] FS-Cache: N-cookie d=00000000f201baff n=00000000dfb127c3 20:32:10 executing program 4: [ 1762.974353][ T2609] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x20d, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:10 executing program 4: 20:32:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0x0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x20e, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:10 executing program 4: 20:32:16 executing program 0: 20:32:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x0, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0x0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:16 executing program 4: 20:32:16 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x20f, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x0, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1769.296663][ T3059] FS-Cache: Duplicate cookie detected [ 1769.302302][ T3059] FS-Cache: O-cookie c=000000002c996d68 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1769.311300][ T3059] FS-Cache: O-cookie d=00000000f201baff n=00000000e9710049 [ 1769.318668][ T3059] FS-Cache: O-key=[10] '0200020000807f000008' [ 1769.325262][ T3059] FS-Cache: N-cookie c=0000000038176138 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1769.334114][ T3059] FS-Cache: N-cookie d=00000000f201baff n=00000000d19b40bc 20:32:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1769.341488][ T3059] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x0, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x210, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1769.649778][ T3475] FS-Cache: Duplicate cookie detected [ 1769.655357][ T3475] FS-Cache: O-cookie c=0000000086a99596 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1769.664621][ T3475] FS-Cache: O-cookie d=00000000f201baff n=00000000e9710049 [ 1769.672537][ T3475] FS-Cache: O-key=[10] '0200020000807f000008' [ 1769.678848][ T3475] FS-Cache: N-cookie c=00000000251467f1 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1769.688175][ T3475] FS-Cache: N-cookie d=00000000f201baff n=00000000c7c6553f [ 1769.695449][ T3475] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x0, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x0, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x211, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1770.092455][ T3651] FS-Cache: Duplicate cookie detected [ 1770.098303][ T3651] FS-Cache: O-cookie c=00000000beb13f67 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1770.107404][ T3651] FS-Cache: O-cookie d=00000000f201baff n=00000000d19b40bc [ 1770.114705][ T3651] FS-Cache: O-key=[10] '0200020000807f000008' [ 1770.121126][ T3651] FS-Cache: N-cookie c=00000000267b0937 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1770.129894][ T3651] FS-Cache: N-cookie d=00000000f201baff n=00000000e9710049 [ 1770.137411][ T3651] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x212, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x0, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x0, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x0, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1775.554733][ T3874] FS-Cache: Duplicate cookie detected [ 1775.560428][ T3874] FS-Cache: O-cookie c=00000000ec6850a3 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1775.569683][ T3874] FS-Cache: O-cookie d=00000000f201baff n=00000000c2835619 [ 1775.576947][ T3874] FS-Cache: O-key=[10] '0200020000807f000008' [ 1775.583339][ T3874] FS-Cache: N-cookie c=0000000035b5a533 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1775.592359][ T3874] FS-Cache: N-cookie d=00000000f201baff n=0000000081cfba0b [ 1775.599683][ T3874] FS-Cache: N-key=[10] '0200020000807f000008' [ 1775.606547][ T3875] FS-Cache: Duplicate cookie detected [ 1775.612412][ T3875] FS-Cache: O-cookie c=00000000ec6850a3 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1775.621412][ T3875] FS-Cache: O-cookie d=00000000f201baff n=00000000c2835619 [ 1775.628778][ T3875] FS-Cache: O-key=[10] '0200020000807f000008' [ 1775.635325][ T3875] FS-Cache: N-cookie c=00000000d5bdb75e [p=0000000049888e43 fl=2 nc=0 na=1] [ 1775.644175][ T3875] FS-Cache: N-cookie d=00000000f201baff n=000000004b238b21 20:32:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x213, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1775.651583][ T3875] FS-Cache: N-key=[10] '0200020000807f000008' [ 1775.658525][ T3879] FS-Cache: Duplicate cookie detected [ 1775.664047][ T3879] FS-Cache: O-cookie c=00000000ec6850a3 [p=0000000049888e43 fl=212 nc=0 na=0] [ 1775.673165][ T3879] FS-Cache: O-cookie d=000000006376aa93 n=000000006376aa93 [ 1775.680468][ T3879] FS-Cache: O-key=[10] '0200020000807f000008' [ 1775.686833][ T3879] FS-Cache: N-cookie c=0000000074b1912d [p=0000000049888e43 fl=2 nc=0 na=1] [ 1775.695725][ T3879] FS-Cache: N-cookie d=00000000f201baff n=000000002ad1398e [ 1775.703198][ T3879] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x214, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x0, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x0, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x215, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1776.339444][ T4303] FS-Cache: Duplicate cookie detected [ 1776.344937][ T4303] FS-Cache: O-cookie c=00000000fad02a55 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1776.354094][ T4303] FS-Cache: O-cookie d=00000000f201baff n=00000000c7c6553f [ 1776.361685][ T4303] FS-Cache: O-key=[10] '0200020000807f000008' [ 1776.368171][ T4303] FS-Cache: N-cookie c=000000007aee493c [p=0000000049888e43 fl=2 nc=0 na=1] [ 1776.376951][ T4303] FS-Cache: N-cookie d=00000000f201baff n=00000000b1e2ae35 [ 1776.384426][ T4303] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x0, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x216, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000", 0x28}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:32:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x0, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x0, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1781.770179][ T4622] FS-Cache: Duplicate cookie detected [ 1781.775674][ T4622] FS-Cache: O-cookie c=000000007d14f4f0 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1781.784735][ T4622] FS-Cache: O-cookie d=00000000f201baff n=000000009b1fe3d8 [ 1781.792041][ T4622] FS-Cache: O-key=[10] '0200020000807f000008' [ 1781.798629][ T4622] FS-Cache: N-cookie c=000000002fde755c [p=0000000049888e43 fl=2 nc=0 na=1] [ 1781.807419][ T4622] FS-Cache: N-cookie d=00000000f201baff n=00000000c522bd90 [ 1781.814659][ T4622] FS-Cache: N-key=[10] '0200020000807f000008' [ 1781.822375][ T4628] FS-Cache: Duplicate cookie detected [ 1781.828259][ T4628] FS-Cache: O-cookie c=000000007d14f4f0 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1781.837272][ T4628] FS-Cache: O-cookie d=00000000f201baff n=000000009b1fe3d8 [ 1781.844585][ T4628] FS-Cache: O-key=[10] '0200020000807f000008' [ 1781.850939][ T4628] FS-Cache: N-cookie c=00000000c26ec611 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1781.859712][ T4628] FS-Cache: N-cookie d=00000000f201baff n=000000004a3a4f26 20:32:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000", 0x28}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1781.866993][ T4628] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x217, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x218, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000", 0x28}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:32:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x0, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x0, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) [ 1782.515871][ T4956] FS-Cache: Duplicate cookie detected [ 1782.521652][ T4956] FS-Cache: O-cookie c=00000000251467f1 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1782.530595][ T4956] FS-Cache: O-cookie d=00000000f201baff n=0000000060d3c842 [ 1782.537956][ T4956] FS-Cache: O-key=[10] '0200020000807f000008' [ 1782.544656][ T4956] FS-Cache: N-cookie c=0000000017fe0153 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1782.553470][ T4956] FS-Cache: N-cookie d=00000000f201baff n=000000001004cf16 [ 1782.560803][ T4956] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x219, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x0, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) setsockopt$inet_buf(r1, 0x0, 0x23, &(0x7f0000000080)="8d9aae73942dc28c6859c31cf3690d4ec7352407c08699ad65513d28169e3103cf3f1024960ff528e2771287a7034fc1de195fecbe8bc2c6d3721e69afd7aa5b8b4f5e2e048573a9300450c96aa3824f93c01201207a8bd77a5c0377c1935627e09fb4d9c2872d85f0d55e4e76afee4db3784941202f13da44c162864b794922410f4bfffe4ef9a6f9c2d7bb17378a9a1757e492c00e7e9a67", 0x99) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) fchmod(0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 20:32:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x0, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) [ 1791.202423][ T5175] FS-Cache: Duplicate cookie detected [ 1791.210774][ T5175] FS-Cache: O-cookie c=000000008b43c930 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1791.219769][ T5175] FS-Cache: O-cookie d=00000000f201baff n=000000001004cf16 [ 1791.227007][ T5175] FS-Cache: O-key=[10] '0200020000807f000008' [ 1791.233417][ T5175] FS-Cache: N-cookie c=000000007d7ce56a [p=0000000049888e43 fl=2 nc=0 na=1] [ 1791.242562][ T5175] FS-Cache: N-cookie d=00000000f201baff n=000000002207c71a [ 1791.249905][ T5175] FS-Cache: N-key=[10] '0200020000807f000008' [ 1791.266502][ T5177] FS-Cache: Duplicate cookie detected [ 1791.272165][ T5177] FS-Cache: O-cookie c=000000008b43c930 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1791.281180][ T5177] FS-Cache: O-cookie d=00000000f201baff n=000000001004cf16 [ 1791.288515][ T5177] FS-Cache: O-key=[10] '0200020000807f000008' [ 1791.294946][ T5177] FS-Cache: N-cookie c=000000007731b713 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1791.303769][ T5177] FS-Cache: N-cookie d=00000000f201baff n=0000000051f9bc19 [ 1791.311074][ T5177] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x21a, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:39 executing program 4 (fault-call:10 fault-nth:0): prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:32:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x21b, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x0, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x1202) ioctl$int_in(r0, 0x80000040045010, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x3, 0x442, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000566], 0x0, &(0x7f0000000100), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{0x12, 0x4, 0xfbfb, 'ip6tnl0\x00', 'nr0\x00', 'nr0\x00', '\x00', @empty, [0xff, 0xff, 0x0, 0x17e], @broadcast, [0x0, 0xff], 0xa6, 0x10e, 0x146, [@cluster={'cluster\x00', 0x10, {{0x8001, 0x7fff, 0x2}}}], [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0x1}}}], @snat={'snat\x00', 0x10, {{@remote, 0x10}}}}]}, {0x0, '\x00', 0x1, 0x99ef519cad6ce81b, 0x2, [{0x11, 0x40, 0xf6, 'bcsf0\x00', 'ifb0\x00', 'ip6tnl0\x00', 'nlmon0\x00', @empty, [0x251346d1dd8435c4, 0x0, 0x7f, 0xff, 0x0, 0xff], @random="ed697eb9f0bf", [0xff, 0xff, 0x17e, 0x0, 0xff, 0xff], 0x9e, 0x10e, 0x15e, [@cgroup0={'cgroup\x00', 0x8, {{0x81}}}], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffc}}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0x8000000000000002}}}], @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x0, 0x200, 0x6}}}}, {0x9, 0x4, 0x8864, 'irlan0\x00', 'bcsh0\x00', 'irlan0\x00', 'bcsh0\x00', @dev={[], 0xb}, [0x0, 0x0, 0xff, 0x0, 0xff], @remote, [0x101, 0x0, 0xff, 0x0, 0xff, 0xff], 0xa6, 0xa6, 0xde, [@mac={'mac\x00', 0x10, {{@remote, 0x1}}}], [], @snat={'snat\x00', 0x10, {{@link_local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x4ba) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_ROPEN(r3, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x28}, 0x7c3}}, 0x18) 20:32:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x21c, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:32:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1799.643086][ T5825] FS-Cache: Duplicate cookie detected [ 1799.648789][ T5825] FS-Cache: O-cookie c=000000008b315dad [p=0000000049888e43 fl=222 nc=0 na=1] [ 1799.657792][ T5825] FS-Cache: O-cookie d=00000000f201baff n=00000000d399221f [ 1799.665593][ T5825] FS-Cache: O-key=[10] '0200020000807f000008' [ 1799.672397][ T5825] FS-Cache: N-cookie c=000000003735a689 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1799.681928][ T5825] FS-Cache: N-cookie d=00000000f201baff n=000000002e15d6a3 20:32:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x21d, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1799.689196][ T5825] FS-Cache: N-key=[10] '0200020000807f000008' [ 1799.719045][ T5833] FS-Cache: Duplicate cookie detected [ 1799.724532][ T5833] FS-Cache: O-cookie c=000000008b315dad [p=0000000049888e43 fl=222 nc=0 na=1] [ 1799.733647][ T5833] FS-Cache: O-cookie d=00000000f201baff n=00000000d399221f [ 1799.740972][ T5833] FS-Cache: O-key=[10] '0200020000807f000008' [ 1799.747472][ T5833] FS-Cache: N-cookie c=00000000ec6850a3 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1799.756334][ T5833] FS-Cache: N-cookie d=00000000f201baff n=0000000005ceb1e3 [ 1799.763747][ T5833] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x21e, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x21f, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x220, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000440)='cpu.stat\x00', 0x2761, 0x0) 20:32:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1000, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000340)={0x0, 0xc, 0x2, 0x14}, &(0x7f0000000380)=0x94, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x15}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=r1, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) bind(r2, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) accept4(r2, 0x0, &(0x7f0000000040)=0x146, 0x800) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:32:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1805.946113][ T6478] FS-Cache: Duplicate cookie detected [ 1805.951789][ T6478] FS-Cache: O-cookie c=000000000db44f4b [p=0000000049888e43 fl=222 nc=0 na=1] [ 1805.960813][ T6478] FS-Cache: O-cookie d=00000000f201baff n=00000000a43a60b1 [ 1805.968127][ T6478] FS-Cache: O-key=[10] '0200020000807f000008' [ 1805.974458][ T6478] FS-Cache: N-cookie c=00000000b470dbd1 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1805.983287][ T6478] FS-Cache: N-cookie d=00000000f201baff n=000000008399ddc1 [ 1805.990637][ T6478] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = getpgid(r5) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x2, r6) r7 = socket(0x40000000015, 0x5, 0x0) bind(r7, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) kcmp(r4, r6, 0x11add988af3cf497, 0xffffffffffffffff, r7) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:32:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x221, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:32:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:32:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = eventfd(0x5) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) getpgid(r2) capset(&(0x7f00000002c0)={0x19980330, r2}, &(0x7f0000000580)={0xc, 0x2, 0x89, 0x3, 0xca, 0xca2c}) r3 = socket(0x40000000015, 0x5, 0x0) bind(r3, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) kcmp(r2, 0x0, 0x2, r1, r3) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1806.306100][ T6797] FS-Cache: Duplicate cookie detected [ 1806.311906][ T6797] FS-Cache: O-cookie c=000000006c710359 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1806.320984][ T6797] FS-Cache: O-cookie d=00000000f201baff n=000000005510003a [ 1806.328307][ T6797] FS-Cache: O-key=[10] '0200020000807f000008' [ 1806.334830][ T6797] FS-Cache: N-cookie c=00000000f30d19a1 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1806.343635][ T6797] FS-Cache: N-cookie d=00000000f201baff n=00000000a759c175 20:32:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x222, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1806.350911][ T6797] FS-Cache: N-key=[10] '0200020000807f000008' 20:32:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0x0, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:32:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5058, 0x18100) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:00 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x223, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:00 executing program 0: 20:33:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0x0, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1813.266848][ T7231] FS-Cache: Duplicate cookie detected [ 1813.272526][ T7231] FS-Cache: O-cookie c=000000007214a7ac [p=0000000049888e43 fl=222 nc=0 na=1] [ 1813.281568][ T7231] FS-Cache: O-cookie d=00000000f201baff n=00000000a43a60b1 [ 1813.288821][ T7231] FS-Cache: O-key=[10] '0200020000807f000008' [ 1813.295183][ T7231] FS-Cache: N-cookie c=0000000035b5a533 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1813.303996][ T7231] FS-Cache: N-cookie d=00000000f201baff n=000000008399ddc1 20:33:00 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x224, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1813.311331][ T7231] FS-Cache: N-key=[10] '0200020000807f000008' [ 1813.321309][ T7234] FS-Cache: Duplicate cookie detected [ 1813.326887][ T7234] FS-Cache: O-cookie c=000000007214a7ac [p=0000000049888e43 fl=222 nc=0 na=1] [ 1813.336295][ T7234] FS-Cache: O-cookie d=00000000f201baff n=00000000a43a60b1 [ 1813.343838][ T7234] FS-Cache: O-key=[10] '0200020000807f000008' [ 1813.350941][ T7234] FS-Cache: N-cookie c=00000000c26ec611 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1813.359789][ T7234] FS-Cache: N-cookie d=00000000f201baff n=00000000619a236b [ 1813.367169][ T7234] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x225, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x226, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0x0, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x1) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x5, 0x100000) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) set_tid_address(&(0x7f0000000000)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x227, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:04 executing program 0: 20:33:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) ptrace$setregset(0x4205, r0, 0x302, &(0x7f0000000080)={&(0x7f0000000100)="ad0caf8f1c2a3436944e51cab69f064d6d72d7892c27c005af1f2637f66272680753e0fe32435314d17cb247e112fb5ab4a5c8b3733085c3a32fdb1d7eb8f2ea7c6f7098d36b921ff0acfc0131acc1a7c4f93e3477cc859bf285cceccd84102dcd5a6beb67faff1f223b556a509ff1640afe6955b258fc3eaa6f6dfddaf3c0b3d47dfd5ae2d7d0a39f34", 0x8a}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = fcntl$getown(0xffffffffffffffff, 0x9) getpgid(r2) capset(&(0x7f00000002c0)={0x19980330, r2}, &(0x7f0000000580)={0xc, 0x2, 0x89, 0x3, 0xca, 0xca2c}) ptrace$cont(0x29, r2, 0xc7ed, 0x8) r3 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0xe3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fanotify_mark(r3, 0x1, 0x820, r6, &(0x7f0000000200)='./file0\x00') 20:33:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0x0, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x228, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0x0, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0x0, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000340)=""/34, 0x22}, {&(0x7f0000000380)=""/216, 0xd8}, {&(0x7f0000000480)=""/172, 0xac}], 0x3, &(0x7f0000000580)=""/243, 0xf3}, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)="21095bba60c9c2fd05c81099049c426e749bc935aea658820e85040f74c9d0e95ac7c96540e158ab6fb5f62fe7c45589afcd9849e6f69d516175a77912f2ccd0f4655b2eb48282298fe6f3ad1ee58b415e75ef39d25a0607416bd029736285b2fc0b94cf167b800088d1b4cbd569945fe1764ea28934da866b85dba2ec280d82148303e8a5190a960f0a001d606ed1c43f568a38118ba1a962eede42119e8bb2e5e2e8a134eb504f5e966460a38a26b22acfc17e94a692d398f4122cd716dbb65d35b7579e", 0xfffffffffffffed6}], 0x1000000000000295, 0x4) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1817.469067][ T7833] FS-Cache: Duplicate cookie detected [ 1817.474636][ T7833] FS-Cache: O-cookie c=000000007ca2e7b3 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1817.483877][ T7833] FS-Cache: O-cookie d=00000000f201baff n=0000000042dffbd1 [ 1817.491230][ T7833] FS-Cache: O-key=[10] '0200020000807f000008' [ 1817.497522][ T7833] FS-Cache: N-cookie c=0000000002e23418 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1817.506265][ T7833] FS-Cache: N-cookie d=00000000f201baff n=000000008399ddc1 20:33:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x229, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1817.513982][ T7833] FS-Cache: N-key=[10] '0200020000807f000008' [ 1817.528768][ T7834] FS-Cache: Duplicate cookie detected [ 1817.534280][ T7834] FS-Cache: O-cookie c=000000007ca2e7b3 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1817.543939][ T7834] FS-Cache: O-cookie d=00000000f201baff n=0000000042dffbd1 [ 1817.551250][ T7834] FS-Cache: O-key=[10] '0200020000807f000008' [ 1817.557595][ T7834] FS-Cache: N-cookie c=00000000990044d8 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1817.566356][ T7834] FS-Cache: N-cookie d=00000000f201baff n=00000000b2f8bd84 [ 1817.573637][ T7834] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x22a, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x1f, r0, 0xfffffffffffffffe, 0x80000001) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = fcntl$getown(0xffffffffffffffff, 0x9) getpgid(r1) capset(&(0x7f00000002c0)={0x19980330, r1}, &(0x7f0000000580)={0xc, 0x2, 0x89, 0x3, 0xca, 0xca2c}) ptrace$cont(0x20, r0, 0x5, 0xf80) 20:33:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x22b, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:09 executing program 0: 20:33:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0x0, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x6bbc3abc740be652, r0, 0x7, 0x4) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x80, 0x200) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000100)={{0x0, 0x0, 0x4, 0x81, '\x00', 0x40}, 0x6, 0x4, 0x80000001, 0x0, 0x0, 0x4, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x5, 0x2, 0x40, 0x8000]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0x0, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x22c, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1821.604888][ T8279] FS-Cache: Duplicate cookie detected [ 1821.610472][ T8279] FS-Cache: O-cookie c=0000000032771cc1 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1821.619759][ T8279] FS-Cache: O-cookie d=00000000f201baff n=00000000c2179d9a [ 1821.627033][ T8279] FS-Cache: O-key=[10] '0200020000807f000008' [ 1821.633615][ T8279] FS-Cache: N-cookie c=0000000062789a06 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1821.642447][ T8279] FS-Cache: N-cookie d=00000000f201baff n=000000008399ddc1 20:33:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x22d, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1821.649842][ T8279] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) r1 = shmget(0x2, 0x4000, 0x100, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) timer_create(0xa, &(0x7f00000001c0)={0x0, 0x24, 0x1, @thr={&(0x7f0000000100)="d92cd6b85fdaaae6b74798bf4e8461b1a013a4f73e7c1313d0b6b7badbaf565662d30f05a3739a563e4334211f56bc1667a2eac32854278d161f10ce7a0c4b802f7150e641ce0e3f1a2ab40083a5d07302f4d0edd418fe8d8d471fa0dd6fe732c7c0c09c281f1d1aabe61345cc146f7707aba43e184e618de2566b50f47c6b8ccd7a0af260d16a8dca0d0349c67657a65afdcaf5db490427aa60f0f56761d8f5e6d78b53ea535f42494a1c9ed62ade867b1fb9a3dfa4", &(0x7f0000000040)="e4c63b8d49cbbeb1794baa39f92c2e80fd4b1dd2a1116c2bc68c972f35fb8f2deaf7c537757ec4657c9a22e6e09de4e1f0d76c4af12da9f8065b494a377344c2ddb26ce930bdc17c3a550c8a8d793cd3d5435b1962897093031170af5c5aeb74e52e4b5d28"}}, &(0x7f0000000200)) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket(0x3, 0x80000, 0x5) setsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000000)={@rand_addr=0x5db, @remote}, 0x8) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x22e, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0x0, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) [ 1822.319767][ T8714] FS-Cache: Duplicate cookie detected [ 1822.325296][ T8714] FS-Cache: O-cookie c=00000000ae548624 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1822.334349][ T8714] FS-Cache: O-cookie d=00000000f201baff n=00000000443cb47a [ 1822.341753][ T8714] FS-Cache: O-key=[10] '0200020000807f000008' [ 1822.348340][ T8714] FS-Cache: N-cookie c=000000000157421c [p=0000000049888e43 fl=2 nc=0 na=1] [ 1822.357289][ T8714] FS-Cache: N-cookie d=00000000f201baff n=0000000070f2dbfb [ 1822.364622][ T8714] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:15 executing program 0: 20:33:15 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x22f, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) r4 = socket(0x40000000015, 0x5, 0x0) bind(r4, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r5 = socket(0x40000000015, 0x5, 0x0) bind(r5, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x9, &(0x7f0000000100)={r8}, &(0x7f00000001c0)=0x349) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000240)={r8, 0x2}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f00000002c0)={0x400, 0xa, 0x101, 0x7fffffff, r9}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r10 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x309, r10) request_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='O}&lobdev\x00', r10) ioctl$VIDIOC_DECODER_CMD(r3, 0xc0485660, &(0x7f0000000000)={0x1, 0x0, @raw_data=[0x0, 0xfffffffd, 0x6, 0x6, 0x8, 0x70, 0xfffffffa, 0x2, 0x100, 0x1c00000, 0x9, 0x5, 0x8, 0x2, 0x9ac, 0xb59]}) tkill(r0, 0xc) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup2(r11, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r13, 0x80045300, &(0x7f0000000080)) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/123, 0x7b, 0x3) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) [ 1827.869051][ T8929] FS-Cache: Duplicate cookie detected [ 1827.874528][ T8929] FS-Cache: O-cookie c=00000000ca908f88 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1827.883531][ T8929] FS-Cache: O-cookie d=00000000f201baff n=0000000070f2dbfb [ 1827.890854][ T8929] FS-Cache: O-key=[10] '0200020000807f000008' [ 1827.897215][ T8929] FS-Cache: N-cookie c=00000000d9a3a76b [p=0000000049888e43 fl=2 nc=0 na=1] [ 1827.906020][ T8929] FS-Cache: N-cookie d=00000000f201baff n=00000000cf3c0939 [ 1827.913303][ T8929] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:15 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x230, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000000)={0x66b, 0x6, 0x3ff, 0x71}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x4000, 0x0) getsockopt$netlink(r2, 0x10e, 0x9, &(0x7f0000000140)=""/193, &(0x7f0000000240)=0xc1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0xffffffffffffffff) 20:33:15 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x231, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0x325}, {0x0, 0x4bb}, {&(0x7f0000000180)="6653070000053c07bc3376003639405cb4aed12f0000000000ff47a825d86800278dcff47d010035e958e64f8f36460234432479aef9db31605ae56aaf3fa9ead9c5e43ed596a10c16ffada677fdec35e6b818beb3adc2ab495c475574d69d16548effcb1d39cff92e751da46d7a", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x44) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:19 executing program 0: 20:33:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x232, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = msgget$private(0x0, 0x8) msgsnd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="030000e89bee00cb7ec6499777b06bf70b85d9d98ff0fcec703890e1388a0fa84c96ef71d235c48726ac023ff6b4e9fdb8cbac693760a0268fc8bcf7a6f73b655d80faf4cf41d93230b109a701b7ce31462e743765ee24dc2318ff9562a9828c799e83e52a077fdfcfb71888a0872fe587b606c25d86af387a0a9bbcbd434a0fa4472892a42714ae66d231888f441e75b4b1271b8401260da1c7324d51b96e1e175f946233f6656a3d906e98277d1c4d0ba1f233910f"], 0x8, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000f00f88)) msgrcv(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000080000ff010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/160], 0xa0, 0x0, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)=0x0) r3 = getegid() setregid(r3, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) r6 = getegid() setregid(r6, 0x0) r7 = socket(0x40000000015, 0x5, 0x0) bind(r7, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) msgctl$IPC_SET(r1, 0x1, &(0x7f00000001c0)={{0x8, r2, r3, r5, r6, 0x1, 0x9}, 0x30000000000000, 0x9ec, 0x67, 0x1000, 0x6, 0x7, r0, r8}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r9 = socket(0x40000000015, 0x5, 0x0) bind(r9, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r10 = accept4$nfc_llcp(r4, &(0x7f0000000280), &(0x7f0000000240)=0xfffffca5, 0x81800) setsockopt$sock_void(r10, 0x1, 0x0, 0x0, 0x0) [ 1832.214538][ T9521] FS-Cache: Duplicate cookie detected [ 1832.220169][ T9521] FS-Cache: O-cookie c=0000000036c42671 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1832.229238][ T9521] FS-Cache: O-cookie d=00000000f201baff n=000000004da220b0 [ 1832.236653][ T9521] FS-Cache: O-key=[10] '0200020000807f000008' [ 1832.243121][ T9521] FS-Cache: N-cookie c=00000000a6e95ba9 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1832.251953][ T9521] FS-Cache: N-cookie d=00000000f201baff n=000000003756f2c6 20:33:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x233, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:19 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_POLL(r0, &(0x7f0000000740)={0x18, 0x0, 0x5, {0x8}}, 0x18) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000640)) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x40, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@security={'security\x00', 0xe, 0x4, 0x428, 0x210, 0x0, 0x118, 0x118, 0x118, 0x390, 0x390, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000140), {[{{@ip={@loopback, @dev={0xac, 0x14, 0x14, 0x1e}, 0xff, 0x1fe000000, 'tunl0\x00', 'irlan0\x00', {0xff}, {0xff}, 0x37}, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x5, [0x400, 0x5, 0xff, 0x5, 0x1, 0x80000000], 0xf8, 0x7}, {0x80, [0x5, 0x6, 0x7fffffff, 0x8, 0x8, 0x5], 0x7f}}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev={[], 0x24}, 0x6, 0x4, [0xd, 0x2b, 0x32, 0x3f, 0x1a, 0x10, 0x29, 0x6, 0x2, 0x14, 0x3c, 0x25, 0x14, 0xf, 0x20, 0x2b], 0x9113a809405a9538, 0xfffffff7}}}, {{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x1fffffffe, 0xff000000, '\x00', 'sit0\x00', {0xff}, {0x7f}, 0x6e, 0x3, 0x18}, 0x0, 0x120, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={0x58, 'hashlimit\x00', 0x1, {'bond0\x00', {0x2, 0x88f, 0x5, 0x4, 0x8, 0x9, 0x0, 0x20, 0x40}, 0x3}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x19, 0x40}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev={[], 0x2b}, 0x5, 0xb, [0x3, 0x1d, 0x5, 0x2c, 0xd, 0x22, 0x18, 0x30, 0x21, 0x11, 0xf, 0x10, 0x3f, 0x20, 0x38, 0x6], 0x0, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x488) tkill(r1, 0x3c) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 1832.259371][ T9521] FS-Cache: N-key=[10] '0200020000807f000008' [ 1832.266140][ T9525] FS-Cache: Duplicate cookie detected [ 1832.271719][ T9525] FS-Cache: O-cookie c=0000000036c42671 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1832.280763][ T9525] FS-Cache: O-cookie d=00000000f201baff n=000000004da220b0 [ 1832.288074][ T9525] FS-Cache: O-key=[10] '0200020000807f000008' [ 1832.294500][ T9525] FS-Cache: N-cookie c=00000000853f0f81 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1832.303564][ T9525] FS-Cache: N-cookie d=00000000f201baff n=00000000f325f6f7 [ 1832.311402][ T9525] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x234, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000080)=@buf={0x8a, &(0x7f0000000100)="eaf49faa97fc6c2dfc791668c9435c08e7946f2e8a50fd225e84470bfe9f4a04b1782f7067c0328f898ca52b8cf5c4c764738411bcfffc5b0943ee6a9722b9b751a662ff68dc1426342eed77b091d2c5d184f632e2f60fda1a7f67eb025acacb696e15c2343717f2c983c3ea5f74caefb67e282bbee98067b647ad8eb38395192638f7e2f5bd7f293876"}) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = fcntl$getown(0xffffffffffffffff, 0x9) getpgid(r1) capset(&(0x7f00000002c0)={0x19980330, r1}, &(0x7f0000000580)={0xc, 0x2, 0x89, 0x3, 0xca, 0xca2c}) ptrace$cont(0x18, r1, 0xfffffffffffffffc, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) bind(r2, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r3 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setownex(r2, 0xf, &(0x7f0000000000)={0x0, r3}) 20:33:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:23 executing program 0: 20:33:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x235, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x0, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x9, 0x5d) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x9}, 0x4) tkill(r0, 0x3c) ptrace$cont(0x20, r0, 0x3, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_OWNER(r4, 0xaf01, 0x0) 20:33:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) [ 1836.473529][ T9978] FS-Cache: Duplicate cookie detected [ 1836.479680][ T9978] FS-Cache: O-cookie c=000000004fdf6fbd [p=0000000049888e43 fl=222 nc=0 na=1] [ 1836.488907][ T9978] FS-Cache: O-cookie d=00000000f201baff n=000000008d8e4faf [ 1836.496178][ T9978] FS-Cache: O-key=[10] '0200020000807f000008' [ 1836.502673][ T9978] FS-Cache: N-cookie c=00000000265bebc1 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1836.511611][ T9978] FS-Cache: N-cookie d=00000000f201baff n=00000000e39b12e3 20:33:24 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x236, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1836.519090][ T9978] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:24 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x237, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x9, &(0x7f0000000100)={r2}, &(0x7f00000001c0)=0x349) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000000)=r2, 0x4) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 20:33:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x0, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xfffffffffffffdfa}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000040)={0x1, 0x1, {0x21, 0x1d, 0x15, 0x15, 0x4, 0x1c2912f3, 0x5, 0x40, 0x1}}) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1837.192742][T10413] FS-Cache: Duplicate cookie detected [ 1837.199487][T10413] FS-Cache: O-cookie c=0000000076e8d4b7 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1837.208575][T10413] FS-Cache: O-cookie d=00000000f201baff n=000000003756f2c6 [ 1837.215934][T10413] FS-Cache: O-key=[10] '0200020000807f000008' [ 1837.222492][T10413] FS-Cache: N-cookie c=0000000036c42671 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1837.231548][T10413] FS-Cache: N-cookie d=00000000f201baff n=00000000631aaffe [ 1837.240556][T10413] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:28 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6628, 0x0) 20:33:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:28 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x238, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10000, 0x122) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x37) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) getsockname$netrom(r2, &(0x7f0000000100)={{0x3, @default}, [@rose, @netrom, @netrom, @default, @rose, @bcast, @default, @netrom]}, &(0x7f0000000080)=0x48) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x0, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1840.680529][T10665] FS-Cache: Duplicate cookie detected [ 1840.686061][T10665] FS-Cache: O-cookie c=00000000265bebc1 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1840.695613][T10665] FS-Cache: O-cookie d=00000000f201baff n=00000000335169a8 [ 1840.703064][T10665] FS-Cache: O-key=[10] '0200020000807f000008' [ 1840.709454][T10665] FS-Cache: N-cookie c=00000000cd894533 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1840.718496][T10665] FS-Cache: N-cookie d=00000000f201baff n=0000000000462469 [ 1840.725890][T10665] FS-Cache: N-key=[10] '0200020000807f000008' [ 1840.740155][T10674] FS-Cache: Duplicate cookie detected [ 1840.747416][T10674] FS-Cache: O-cookie c=00000000265bebc1 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1840.760053][T10674] FS-Cache: O-cookie d=00000000f201baff n=00000000335169a8 [ 1840.767393][T10674] FS-Cache: O-key=[10] '0200020000807f000008' 20:33:28 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x239, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1840.773975][T10674] FS-Cache: N-cookie c=0000000022168fa3 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1840.783102][T10674] FS-Cache: N-cookie d=00000000f201baff n=0000000037f1bef8 [ 1840.790375][T10674] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:28 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x23a, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x0, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) recvfrom(r1, &(0x7f0000001240)=""/78, 0x4e, 0x40010140, &(0x7f00000012c0)=@tipc=@name={0x1e, 0x2, 0x2, {{0x1, 0x3}, 0x4}}, 0x80) tkill(r0, 0x3c) r2 = socket(0x40000000015, 0x5, 0x0) bind(r2, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000001180), &(0x7f00000011c0)=0x4) clone3(&(0x7f0000000100)={0x1d07cc00, &(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080), 0x13, 0x0, &(0x7f0000001200)=""/27, 0x1b, &(0x7f0000000140)=""/4096}, 0x40) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x1c, r5, 0x5, 0x0, 0x0, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}]}, 0x1c}}, 0x0) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000013c0)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x34, r5, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1b}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd32}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) ptrace$cont(0x18, r3, 0xffff, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x0, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1841.414833][T11049] FS-Cache: Duplicate cookie detected [ 1841.420789][T11049] FS-Cache: O-cookie c=00000000c4784ea9 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1841.429893][T11049] FS-Cache: O-cookie d=00000000f201baff n=0000000037f1bef8 [ 1841.437421][T11049] FS-Cache: O-key=[10] '0200020000807f000008' [ 1841.443797][T11049] FS-Cache: N-cookie c=00000000fe80ac6c [p=0000000049888e43 fl=2 nc=0 na=1] [ 1841.452976][T11049] FS-Cache: N-cookie d=00000000f201baff n=00000000257a0c2b [ 1841.460356][T11049] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:35 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~up\xa5:\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xe8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9d\xe0\x9d\xbblNC\x05\xdf\xf1<;\x8a\x1c\xc7\x17+\x95m\xcc\xdc:`\xd8\xd9\'\x9a\xf4\xc7\xb6\x1dP\x8cmj\x17M\xabi\xda/\x9e\f\x84\xbc+7\xbb\x06KV\x14\xf7\xf4p\xb7^\xa6\xf0\xbe\xd0\x92\xbe-Q\xfa\x16mp\xc87\xb4L\xd3!\xf5BO\xf1\xd0\x14\xcc\x02\xeb\xa4\"QA\xbb\x89(\xd4,&z\r\xd3\x03\x05\x05\x7f\xb0\xa2\xe3\x90.\xeb\xc3#\xfa\x92k\x89\xb9\xfdnm\xd4):X\xf5\xb4\xa5X\xdc\x90Y\x7f\x7f\xccF\xc8\xa1\xa4\xe6K', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000007) 20:33:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x8000000000000) 20:33:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x23b, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x0, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x0, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1848.003295][T11419] FS-Cache: Duplicate cookie detected [ 1848.008918][T11419] FS-Cache: O-cookie c=00000000d36bb42e [p=0000000049888e43 fl=222 nc=0 na=1] [ 1848.018498][T11419] FS-Cache: O-cookie d=00000000f201baff n=0000000090e50194 [ 1848.025897][T11419] FS-Cache: O-key=[10] '0200020000807f000008' [ 1848.032348][T11419] FS-Cache: N-cookie c=0000000035754784 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1848.041144][T11419] FS-Cache: N-cookie d=00000000f201baff n=0000000013e96e6b 20:33:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket(0x40000000015, 0x5, 0x0) bind(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) tkill(r2, 0x2d) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x23c, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1848.048444][T11419] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x23d, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x0, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1848.747485][T11801] FS-Cache: Duplicate cookie detected [ 1848.753031][T11801] FS-Cache: O-cookie c=00000000808594bb [p=0000000049888e43 fl=222 nc=0 na=1] [ 1848.762020][T11801] FS-Cache: O-cookie d=000000006376aa93 n=000000006376aa93 [ 1848.769435][T11801] FS-Cache: O-key=[10] '0200020000807f000008' [ 1848.775946][T11801] FS-Cache: N-cookie c=00000000f1ccbe8e [p=0000000049888e43 fl=2 nc=0 na=1] [ 1848.784743][T11801] FS-Cache: N-cookie d=00000000f201baff n=000000005510003a [ 1848.792074][T11801] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:43 executing program 0: gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6628, 0x0) 20:33:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:ld_so_t:s0\x00', 0x1d, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1000, 0x8200) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0xa9, "739697148676ee670aa190351c9b475522cd35201fc9c2e554af331303ce98be087c743399004ba80aa177093dc96faf91cec2f7f60417e8c72a5c726006d01f0b20de3b98b1f2b53bdf86ea11be550b5b2ca66b7776cd13b4aae7d72899f0d7bf1a9a372a08ab0929d5865e63771626c8ccc41b1cb8ac56b90e7ac28fa8e2ea4d8b6b44f0af368e3b119e2697ea2b8e0e1b6f986fcd0dd60d59fad62fac1bc8a66c116b751176a0a1"}, &(0x7f0000000040)=0xcd) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:43 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x23e, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x0, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1856.344787][T12006] FS-Cache: Duplicate cookie detected [ 1856.350476][T12006] FS-Cache: O-cookie c=00000000d5bdb75e [p=0000000049888e43 fl=222 nc=0 na=1] [ 1856.359611][T12006] FS-Cache: O-cookie d=00000000f201baff n=000000009b21cd01 [ 1856.369498][T12006] FS-Cache: O-key=[10] '0200020000807f000008' [ 1856.375848][T12006] FS-Cache: N-cookie c=000000009b08c597 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1856.384614][T12006] FS-Cache: N-cookie d=00000000f201baff n=000000004b29e1e4 20:33:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) getgroups(0x3, &(0x7f0000000140)=[r1, r2, r3]) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1856.391917][T12006] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:44 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x23f, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x40000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffff5, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) sysinfo(&(0x7f0000000080)=""/18) ptrace$setopts(0xffffffffffffffff, r0, 0xfffffffffffffffc, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000100)={0x6, 0x7, 0x866, 0x22, 0xee20, 0x9}) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1856.743610][T12378] FS-Cache: Duplicate cookie detected [ 1856.749159][T12378] FS-Cache: O-cookie c=00000000f50b4a2f [p=0000000049888e43 fl=212 nc=0 na=0] [ 1856.758199][T12378] FS-Cache: O-cookie d=000000006376aa93 n=000000006376aa93 [ 1856.765572][T12378] FS-Cache: O-key=[10] '0200020000807f000008' [ 1856.772000][T12378] FS-Cache: N-cookie c=0000000008e93bb2 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1856.780813][T12378] FS-Cache: N-cookie d=00000000f201baff n=0000000059ebd0fe [ 1856.788181][T12378] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:44 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x240, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:53 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002f80)=[{{&(0x7f00000006c0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/198, 0xc6}, {0x0}, {&(0x7f0000001900)=""/116, 0x74}], 0x4}}, {{&(0x7f0000001d80)=@l2, 0x80, &(0x7f0000001e80)}, 0x9}, {{0x0, 0x0, &(0x7f0000002f40)}, 0x5}], 0x3, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)={0x14}) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(khazad)\x00'}, 0x58) 20:33:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = semget$private(0x0, 0x0, 0x0) semctl$SETVAL(r1, 0x0, 0x10, &(0x7f0000000280)=0x1) semctl$IPC_INFO(r1, 0x2, 0x3, &(0x7f0000000000)=""/95) 20:33:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x241, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x20000) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f0000000040)={0x20, "9fa69d8890865e9fe04dc34ea81672f9639196061e6bf632ffa3bdd0f412b56c", 0x800, 0x7, 0x8, 0x0, 0x3}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1865.564322][T12551] FS-Cache: Duplicate cookie detected [ 1865.569911][T12551] FS-Cache: O-cookie c=00000000cc8acdb8 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1865.578973][T12551] FS-Cache: O-cookie d=00000000f201baff n=000000009726d9e9 [ 1865.586404][T12551] FS-Cache: O-key=[10] '0200020000807f000008' [ 1865.592870][T12551] FS-Cache: N-cookie c=00000000e5780258 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1865.601760][T12551] FS-Cache: N-cookie d=00000000f201baff n=000000009afeb71f 20:33:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x242, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1865.609105][T12551] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x8000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x0, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x243, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 20:33:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x40000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:59 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x244, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x0, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1871.882164][T13097] FS-Cache: Duplicate cookie detected [ 1871.887874][T13097] FS-Cache: O-cookie c=00000000395d664a [p=0000000049888e43 fl=222 nc=0 na=1] [ 1871.896830][T13097] FS-Cache: O-cookie d=00000000f201baff n=00000000616a8eb0 [ 1871.904287][T13097] FS-Cache: O-key=[10] '0200020000807f000008' [ 1871.911016][T13097] FS-Cache: N-cookie c=000000004342e1b4 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1871.919750][T13097] FS-Cache: N-cookie d=00000000f201baff n=00000000f4bf8b8d [ 1871.927107][T13097] FS-Cache: N-key=[10] '0200020000807f000008' [ 1871.934128][T13100] FS-Cache: Duplicate cookie detected [ 1871.939644][T13100] FS-Cache: O-cookie c=00000000395d664a [p=0000000049888e43 fl=222 nc=0 na=1] [ 1871.948645][T13100] FS-Cache: O-cookie d=00000000f201baff n=00000000616a8eb0 [ 1871.955888][T13100] FS-Cache: O-key=[10] '0200020000807f000008' [ 1871.962568][T13100] FS-Cache: N-cookie c=0000000066913303 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1871.971346][T13100] FS-Cache: N-cookie d=00000000f201baff n=00000000fdfb5167 20:33:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) getpgid(r1) capset(&(0x7f00000002c0)={0x19980330, r1}, &(0x7f0000000580)={0xc, 0x2, 0x89, 0x3, 0xca, 0xca2c}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x2, 0x0) [ 1871.978749][T13100] FS-Cache: N-key=[10] '0200020000807f000008' 20:33:59 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x245, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:33:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x3ff, 0x14, 0x7f, 0x4, 0x7fffffff}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={r2, 0x7fffffff}, 0x8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:33:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x0, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:33:59 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x246, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1872.547888][T13433] FS-Cache: Duplicate cookie detected [ 1872.553380][T13433] FS-Cache: O-cookie c=00000000ec6850a3 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1872.562767][T13433] FS-Cache: O-cookie d=000000006376aa93 n=000000006376aa93 [ 1872.570051][T13433] FS-Cache: O-key=[10] '0200020000807f000008' [ 1872.576399][T13433] FS-Cache: N-cookie c=0000000004351b2c [p=0000000049888e43 fl=2 nc=0 na=1] [ 1872.585337][T13433] FS-Cache: N-cookie d=00000000f201baff n=00000000f4bf8b8d [ 1872.592625][T13433] FS-Cache: N-key=[10] '0200020000807f000008' 20:34:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@dev}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, 0x300}}, 0xf8}}, 0x0) 20:34:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:34:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0x0, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) clone3(&(0x7f0000000280)={0x0, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140), 0xb, 0x0, &(0x7f0000000180)=""/73, 0x49, &(0x7f0000000200)=""/106}, 0x40) r2 = gettid() fcntl$setown(r1, 0x8, r2) getpid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8935, &(0x7f0000000040)={'netpci0\x00', @ifru_ivalue=0x2}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VT_GETMODE(r5, 0x5601, &(0x7f00000002c0)) pipe(&(0x7f0000000000)) 20:34:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x247, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1878.399470][T13652] FS-Cache: Duplicate cookie detected [ 1878.405077][T13652] FS-Cache: O-cookie c=000000004018d74d [p=0000000049888e43 fl=222 nc=0 na=1] [ 1878.414147][T13652] FS-Cache: O-cookie d=00000000f201baff n=00000000f4bf8b8d [ 1878.421424][T13652] FS-Cache: O-key=[10] '0200020000807f000008' [ 1878.427736][T13652] FS-Cache: N-cookie c=0000000044226206 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1878.436576][T13652] FS-Cache: N-cookie d=00000000f201baff n=000000009bbdc2db [ 1878.444454][T13652] FS-Cache: N-key=[10] '0200020000807f000008' [ 1878.451042][T13655] FS-Cache: Duplicate cookie detected [ 1878.456537][T13655] FS-Cache: O-cookie c=000000004018d74d [p=0000000049888e43 fl=222 nc=0 na=1] [ 1878.465882][T13655] FS-Cache: O-cookie d=00000000f201baff n=00000000f4bf8b8d [ 1878.473405][T13655] FS-Cache: O-key=[10] '0200020000807f000008' [ 1878.479833][T13655] FS-Cache: N-cookie c=00000000edccf642 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1878.488845][T13655] FS-Cache: N-cookie d=00000000f201baff n=00000000616a8eb0 20:34:06 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x248, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1878.496333][T13655] FS-Cache: N-key=[10] '0200020000807f000008' 20:34:06 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x249, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket(0x40000000015, 0x5, 0x0) bind(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x14, 0x2, [@IFLA_BR_STP_STATE={0x8, 0x5, 0x1}, @IFLA_BR_FORWARD_DELAY={0x8}]}}}]}, 0x14b}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x33c4d352f1363d6f}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x28, 0x24, 0x20, 0x70bd27, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {0x2, 0xe}, {0x17, 0x10}, {0x794f35e5db34bd52, 0x4}}}, 0xffffff46}, 0x1, 0x0, 0x0, 0x40000}, 0x40) ptrace$cont(0x20, r0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r9, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, r10}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000016c0)={0x12, 0x10, 0xfa00, {&(0x7f0000001680), r10}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r8, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r10, 0x1}}, 0x18) 20:34:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0x0, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9ee7, 0x20000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000100)={{0xa, 0x4, 0x5, 0x8, 'syz1\x00', 0x92}, 0x6, 0x100, 0xffffdfd0, r5, 0x2, 0x0, 'syz0\x00', &(0x7f0000000080)=['eth1security\x00', 'em0proc\x00'], 0x15, [], [0x400, 0x81, 0xfc3e, 0x5]}) ptrace$cont(0x20, r0, 0x0, 0x0) 20:34:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x0, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1879.183683][T14084] FS-Cache: Duplicate cookie detected [ 1879.189411][T14084] FS-Cache: O-cookie c=000000009b58f0bf [p=0000000049888e43 fl=222 nc=0 na=1] [ 1879.198412][T14084] FS-Cache: O-cookie d=00000000f201baff n=00000000e39b12e3 [ 1879.205653][T14084] FS-Cache: O-key=[10] '0200020000807f000008' [ 1879.212027][T14084] FS-Cache: N-cookie c=00000000cb8bda27 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1879.221253][T14084] FS-Cache: N-cookie d=00000000f201baff n=000000002ee25982 [ 1879.228596][T14084] FS-Cache: N-key=[10] '0200020000807f000008' 20:34:14 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x24a, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:34:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@dev}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, 0x300}}, 0xf8}}, 0x0) 20:34:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x10f010fe3250619a, r0, 0xffffffff, 0x0) 20:34:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0x0, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x0, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000200)='/dev/capi20\x00', 0x10000, 0x0) flock(r1, 0x15) tkill(r0, 0x3c) r2 = fcntl$getown(0xffffffffffffffff, 0x9) getpgid(r2) capset(&(0x7f00000002c0)={0x19980330, r2}, &(0x7f0000000580)={0xc, 0x2, 0x89, 0x3, 0xca, 0xca2c}) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) getpgid(r3) capset(&(0x7f00000002c0)={0x19980330, r3}, &(0x7f0000000580)={0xc, 0x2, 0x89, 0x3, 0xca, 0xca2c}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x3f) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/rt_acct\x00') ioctl$KVM_REINJECT_CONTROL(r4, 0xae71, &(0x7f0000000080)={0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1886.739865][T14296] FS-Cache: Duplicate cookie detected [ 1886.745707][T14296] FS-Cache: O-cookie c=00000000b2d1ef02 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1886.754868][T14296] FS-Cache: O-cookie d=00000000f201baff n=00000000d4b687f1 [ 1886.762587][T14296] FS-Cache: O-key=[10] '0200020000807f000008' [ 1886.768997][T14296] FS-Cache: N-cookie c=000000006c710359 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1886.777790][T14296] FS-Cache: N-cookie d=00000000f201baff n=00000000a9c0bade [ 1886.786008][T14296] FS-Cache: N-key=[10] '0200020000807f000008' 20:34:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:34:14 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x24b, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) getsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:34:14 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x24c, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) bind(r2, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) ioctl$FICLONE(r1, 0x40049409, r2) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(r1, &(0x7f0000000380)=[{&(0x7f00000003c0)="d15d2f983d640ce1d60a35e20ec512a16ef3db26988031ddf7165eca1b144acaa330aae6af3efd864e9003bf3ea1ce36"}, {&(0x7f0000000240)="06e5c8719329a0d391d668ffa0bdf5878328a7d044679dc9077199ff864e8ceb65d215b86953223c0acc03bd3f932a028b5e797acb7541c908fa31ce19051d13dd439f5edbc97e8f89cc8fa4ab67eef9c8a6f01ee051e16ae53ea2790c1a26ffb3549cf86530ff8916d063671ec73dfac2ad2018ce9f382e5e1c2eff6d540a216bdfa3d1dad78c89a42025d1cef6278018b30ffbcda43f0ecd6aabe8c1ece2dff87500fb1bdb1249460e023cb3248378d4c40d7ae4c3748d1fc085db"}, {&(0x7f0000000300)="99514c2e59015eeada557405f47b8c8fa18e0a18dac39f3fa610fb543de2491cd33dd097d7727872b38b8a1852ad22adf947a12cdeb36152d336c136825fed17a165fe033b557f8954cce7bc095d279ff2debfc61d5bb8e0a4af6c3850"}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffffffffffff9bc9, 0x101000) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000100)="a8098c9b813f056c7a935e81835abcd7f61a6d15227371bb1754fc57f83bc3c8287e678ef04fe122b9e055e924b703dcdb62e7de9037d017c96e8d321682442369000626b906fba5a9db2acf52cefb93b106e07d9b77f63e27688b82cc14ac3872ebfac19bbbc47e7e49cfebeb7957eb42431e495e79e6284c313dd2de5a29f1729475baa7e31463bd4ccbc6d46465e3c52b087540f4d009badd7f34503d99804acf92b26385f1ea2d4d50f7abdd2ec3fd87b3c784c576c6d661ea6a7b00461b694613266e816f5f34e58f51a83b2b1fd91b2d") ptrace$cont(0x20, r0, 0x0, 0x0) 20:34:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x0, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:34:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x0, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1887.515198][T14741] FS-Cache: Duplicate cookie detected [ 1887.521159][T14741] FS-Cache: O-cookie c=0000000067f1258c [p=0000000049888e43 fl=222 nc=0 na=1] [ 1887.530173][T14741] FS-Cache: O-cookie d=00000000f201baff n=00000000019f4b4e [ 1887.537500][T14741] FS-Cache: O-key=[10] '0200020000807f000008' [ 1887.543903][T14741] FS-Cache: N-cookie c=00000000fe80ac6c [p=0000000049888e43 fl=2 nc=0 na=1] [ 1887.553263][T14741] FS-Cache: N-cookie d=00000000f201baff n=00000000ab587a99 [ 1887.560677][T14741] FS-Cache: N-key=[10] '0200020000807f000008' 20:34:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:34:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x0, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x24d, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) prctl$PR_CAPBSET_READ(0x17, 0xc) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x5, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:34:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x0, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:34:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x0, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1895.274427][T14957] FS-Cache: Duplicate cookie detected [ 1895.280350][T14957] FS-Cache: O-cookie c=000000008480bcbd [p=0000000049888e43 fl=222 nc=0 na=1] [ 1895.289441][T14957] FS-Cache: O-cookie d=00000000f201baff n=00000000ba121919 [ 1895.296689][T14957] FS-Cache: O-key=[10] '0200020000807f000008' [ 1895.303126][T14957] FS-Cache: N-cookie c=00000000cc56a39d [p=0000000049888e43 fl=2 nc=0 na=1] [ 1895.311962][T14957] FS-Cache: N-cookie d=00000000f201baff n=00000000019f4b4e [ 1895.319298][T14957] FS-Cache: N-key=[10] '0200020000807f000008' [ 1895.326330][T14964] FS-Cache: Duplicate cookie detected [ 1895.331923][T14964] FS-Cache: O-cookie c=000000008480bcbd [p=0000000049888e43 fl=222 nc=0 na=1] [ 1895.340921][T14964] FS-Cache: O-cookie d=00000000f201baff n=00000000ba121919 [ 1895.348233][T14964] FS-Cache: O-key=[10] '0200020000807f000008' [ 1895.354702][T14964] FS-Cache: N-cookie c=0000000086a99596 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1895.363520][T14964] FS-Cache: N-cookie d=00000000f201baff n=000000009b1fe3d8 [ 1895.370905][T14964] FS-Cache: N-key=[10] '0200020000807f000008' 20:34:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x24e, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() r2 = socket(0x40000000015, 0x5, 0x0) bind(r2, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0x7, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x0, 0x6, 0x19, 0x2, 0x10, 0x14}, @generic={0x8, 0xf, 0x2, 0x2, 0x4}, @ldst={0x3, 0x3, 0x5, 0x1, 0x7, 0x0, 0x4}, @jmp={0x5, 0x0, 0x3, 0x5, 0x0, 0x1, 0x8}, @alu={0x4, 0x1, 0x2, 0x6160a025649bcd25, 0x0, 0x7ffffffffffffe86}, @alu={0x7, 0x0, 0x0, 0xb, 0x2, 0x50, 0x8}, @ldst={0x2, 0x1, 0x5, 0x8, 0x4, 0xffffffffffffff70, 0x2}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xfa, &(0x7f0000000540)=""/250, 0x41100, 0x0, [], 0x0, 0x28, r4, 0x8, &(0x7f0000000280)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x3, 0x4}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r5}, 0xc) r6 = socket(0x3, 0x5, 0x0) r7 = syz_open_dev$dspn(&(0x7f0000000740)='/dev/dsp#\x00', 0x235, 0x3dbd48601324f059) ioctl$KVM_GET_NR_MMU_PAGES(r7, 0xae45, 0x789) bind(r6, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(r6, 0x0, 0x487, &(0x7f00000006c0), &(0x7f0000000700)=0x30) r8 = socket(0x40000000015, 0x5, 0x0) bind(r8, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) ioctl$sock_inet_SIOCRTMSG(r8, 0x890d, &(0x7f0000000640)={0x0, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e21, @empty}, {0x2, 0x4e22, @remote}, 0x44, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000380)='bond_slave_0\x00', 0x8001, 0x4, 0x95}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r3, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r5}, 0x30) kcmp(0xffffffffffffffff, r1, 0x2, r2, r9) ptrace$cont(0x20, r0, 0x0, 0x0) 20:34:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0x0, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket(0x40000000015, 0x3, 0x0) bind(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0x20000, 0x1000, 0x9}, 0x18) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xe653, 0x400002) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000100)={0x0, @reserved}) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$UHID_CREATE(r5, &(0x7f0000000280)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f00000001c0)=""/163, 0xa3, 0x9, 0xc55, 0x5, 0xb36e, 0x10001}, 0x120) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:34:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x0, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:34:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x24f, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:32 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f0000000040)="bd") 20:34:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x0, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0x0, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet6(r1, 0x0, &(0x7f0000000000), 0x800) wait4(0x0, 0x0, 0x80000002, 0x0) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) vmsplice(r2, &(0x7f00000000c0)=[{0x0}, {0x0, 0x66}, {0x0, 0x3d3}, {&(0x7f0000001380)="6653070000053c07bc337600a52d4d393639405cd86800278dcff47d210000805ae64f8f36460234", 0xb}], 0x3aa, 0xc) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:34:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0x0, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:34:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x250, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1904.666090][T15505] FS-Cache: Duplicate cookie detected [ 1904.671657][T15505] FS-Cache: O-cookie c=000000005500c3d6 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1904.680878][T15505] FS-Cache: O-cookie d=00000000f201baff n=00000000c522bd90 [ 1904.688335][T15505] FS-Cache: O-key=[10] '0200020000807f000008' [ 1904.694705][T15505] FS-Cache: N-cookie c=00000000cee3c848 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1904.703519][T15505] FS-Cache: N-cookie d=00000000f201baff n=000000009bbdc2db [ 1904.710772][T15505] FS-Cache: N-key=[10] '0200020000807f000008' [ 1904.717638][T15512] FS-Cache: Duplicate cookie detected [ 1904.723119][T15512] FS-Cache: O-cookie c=000000005500c3d6 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1904.732706][T15512] FS-Cache: O-cookie d=00000000f201baff n=00000000c522bd90 [ 1904.740062][T15512] FS-Cache: O-key=[10] '0200020000807f000008' [ 1904.746348][T15512] FS-Cache: N-cookie c=00000000c8475588 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1904.755324][T15512] FS-Cache: N-cookie d=00000000f201baff n=00000000ffe52035 [ 1904.762641][T15512] FS-Cache: N-key=[10] '0200020000807f000008' 20:34:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0x0, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:34:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0x0, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x0, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x251, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080)={0x3, 0x5, 0x0, 0x5000}, 0x8) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, r8}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000016c0)={0x12, 0x10, 0xfa00, {&(0x7f0000001680), r8}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r8, 0x80}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) faccessat(r3, &(0x7f0000000000)='./file0\x00', 0x20, 0x400) ptrace$setregs(0xd283e3ab04b0891c, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1905.214279][T15826] FS-Cache: Duplicate cookie detected [ 1905.219832][T15826] FS-Cache: O-cookie c=00000000f55b79be [p=0000000049888e43 fl=222 nc=0 na=1] [ 1905.228762][T15826] FS-Cache: O-cookie d=00000000f201baff n=000000004c5be15f [ 1905.236081][T15826] FS-Cache: O-key=[10] '0200020000807f000008' [ 1905.242483][T15826] FS-Cache: N-cookie c=00000000d6e38bd4 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1905.251267][T15826] FS-Cache: N-cookie d=00000000f201baff n=00000000a0584ec6 20:34:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x252, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1905.258617][T15826] FS-Cache: N-key=[10] '0200020000807f000008' [ 1905.282219][T15926] FS-Cache: Duplicate cookie detected [ 1905.287792][T15926] FS-Cache: O-cookie c=00000000f55b79be [p=0000000049888e43 fl=222 nc=0 na=1] [ 1905.296699][T15926] FS-Cache: O-cookie d=00000000f201baff n=000000004c5be15f [ 1905.304158][T15926] FS-Cache: O-key=[10] '0200020000807f000008' [ 1905.310653][T15926] FS-Cache: N-cookie c=00000000bd5a3293 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1905.319475][T15926] FS-Cache: N-cookie d=00000000f201baff n=00000000bcc2ff9d [ 1905.326747][T15926] FS-Cache: N-key=[10] '0200020000807f000008' 20:34:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x253, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x1, 0x8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000040)) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000080)=0x9, &(0x7f0000000100)=0x4) getpgid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000180)={0x6, 0x0, 0x4, 0x70000, {r6, r7/1000+30000}, {0x3, 0x1, 0x5, 0x8, 0x87, 0x3, "a39f2d68"}, 0x1, 0xc, @userptr=0x2, 0x4}) capset(&(0x7f00000002c0)={0x19980330, r2}, &(0x7f0000000580)={0xc, 0x2, 0x89, 0x3, 0xca, 0xca2c}) ptrace$cont(0x9, r0, 0x0, 0x0) 20:34:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(0xffffffffffffffff, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00000000c0), 0x8) 20:34:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x0, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x0, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0x0, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) [ 1912.976703][T16154] FS-Cache: Duplicate cookie detected [ 1912.982579][T16154] FS-Cache: O-cookie c=00000000f8febb65 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1912.991630][T16154] FS-Cache: O-cookie d=00000000f201baff n=00000000d7fd7f42 [ 1912.998985][T16154] FS-Cache: O-key=[10] '0200020000807f000008' [ 1913.005361][T16154] FS-Cache: N-cookie c=00000000bd5a3293 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1913.014134][T16154] FS-Cache: N-cookie d=00000000f201baff n=0000000060d3c842 [ 1913.021420][T16154] FS-Cache: N-key=[10] '0200020000807f000008' [ 1913.031058][T16160] FS-Cache: Duplicate cookie detected [ 1913.036644][T16160] FS-Cache: O-cookie c=00000000f8febb65 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1913.045948][T16160] FS-Cache: O-cookie d=00000000f201baff n=00000000d7fd7f42 [ 1913.053231][T16160] FS-Cache: O-key=[10] '0200020000807f000008' [ 1913.060144][T16160] FS-Cache: N-cookie c=000000000c6fe368 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1913.068934][T16160] FS-Cache: N-cookie d=00000000f201baff n=0000000013e96e6b 20:34:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)=0x81) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:34:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x254, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1913.076226][T16160] FS-Cache: N-key=[10] '0200020000807f000008' 20:34:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x0, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0xffffffffffffe0b, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x2040) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)) 20:34:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x255, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x0, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x0, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:34:41 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x256, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1913.794152][T16596] FS-Cache: Duplicate cookie detected [ 1913.799833][T16596] FS-Cache: O-cookie c=000000002fde755c [p=0000000049888e43 fl=222 nc=0 na=1] [ 1913.809201][T16596] FS-Cache: O-cookie d=000000006376aa93 n=000000006376aa93 [ 1913.816465][T16596] FS-Cache: O-key=[10] '0200020000807f000008' [ 1913.822983][T16596] FS-Cache: N-cookie c=00000000eec434fe [p=0000000049888e43 fl=2 nc=0 na=1] [ 1913.831860][T16596] FS-Cache: N-cookie d=00000000f201baff n=000000002ebbc72c [ 1913.839304][T16596] FS-Cache: N-key=[10] '0200020000807f000008' [ 1919.189444][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:34:46 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000240)='\'\x00') 20:34:46 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x257, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x100081) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = getpgid(r1) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x2, r2) capset(&(0x7f0000000100)={0x20080522, r2}, &(0x7f0000000140)={0x8000, 0xfffff801, 0x200, 0x81, 0x6, 0x5}) ioctl$USBDEVFS_REAPURB(r0, 0x4008550c, &(0x7f0000000040)) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SG_GET_COMMAND_Q(r6, 0x2270, &(0x7f0000000080)) r7 = fcntl$getown(0xffffffffffffffff, 0x9) prctl$PR_SET_ENDIAN(0x14, 0x0) getpgid(r7) capset(&(0x7f00000002c0)={0x19980330, r7}, &(0x7f0000000580)={0xc, 0x2, 0x89, 0x3, 0xca, 0xca2c}) ptrace$cont(0x20, r7, 0x0, 0x7) 20:34:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x0, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x0, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x0, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) [ 1919.517219][T16812] FS-Cache: Duplicate cookie detected [ 1919.522793][T16812] FS-Cache: O-cookie c=00000000fff2b4db [p=0000000049888e43 fl=222 nc=0 na=1] [ 1919.531860][T16812] FS-Cache: O-cookie d=00000000f201baff n=00000000ab587a99 [ 1919.539300][T16812] FS-Cache: O-key=[10] '0200020000807f000008' [ 1919.545688][T16812] FS-Cache: N-cookie c=000000009b08c597 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1919.554485][T16812] FS-Cache: N-cookie d=00000000f201baff n=00000000f092e52c [ 1919.561983][T16812] FS-Cache: N-key=[10] '0200020000807f000008' [ 1919.580622][T16816] FS-Cache: Duplicate cookie detected [ 1919.586111][T16816] FS-Cache: O-cookie c=00000000fff2b4db [p=0000000049888e43 fl=222 nc=0 na=1] [ 1919.595158][T16816] FS-Cache: O-cookie d=000000006376aa93 n=000000006376aa93 [ 1919.602478][T16816] FS-Cache: O-key=[10] '0200020000807f000008' [ 1919.608840][T16816] FS-Cache: N-cookie c=00000000b073e632 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1919.617722][T16816] FS-Cache: N-cookie d=00000000f201baff n=000000006d135719 [ 1919.625063][T16816] FS-Cache: N-key=[10] '0200020000807f000008' 20:34:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x258, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x0, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x0, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:34:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x259, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xdb, 0x0, 0x0, 0x0, 0xffffffffffffffa8}, 0x40) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) r4 = socket(0x40000000015, 0x5, 0x0) bind(r4, &(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r5 = socket(0x40000000015, 0x5, 0x0) bind(r5, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r6 = dup3(r4, r5, 0x80000) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r7, 0x40086425, &(0x7f0000000040)={r8}) ioctl$DRM_IOCTL_LOCK(r6, 0x4008642a, &(0x7f0000000080)={r8, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$char_usb(0xffffffffffffffff, &(0x7f0000000000)=""/10, 0xa) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, r3, 0x3ff) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r9 = socket(0x40000000015, 0x5, 0x0) bind(r9, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r10 = socket(0x40000000015, 0x5, 0x0) bind(r10, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) splice(r9, &(0x7f0000000180)=0x1f, r10, &(0x7f00000001c0)=0x5, 0x36e, 0x1) 20:34:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioprio_set$uid(0x3, r1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) prctl$PR_MCE_KILL_GET(0x22) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 1927.758188][T17357] ecryptfs_parse_options: eCryptfs: unrecognized option ['] [ 1927.766108][T17357] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1927.779167][T17357] Error parsing options; rc = [-22] [ 1927.786919][T17356] ecryptfs_parse_options: eCryptfs: unrecognized option ['] [ 1927.794312][T17356] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 20:34:55 executing program 0: syz_open_dev$evdev(0x0, 0x1, 0x20200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4205}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xbc}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xffffffab) open(0x0, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) readv(r2, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/11, 0x2}], 0x10000000000000dc) socket$inet6(0xa, 0x5ff7e0e3b0d534da, 0x25) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), 0x20) syz_open_procfs(0x0, &(0x7f00000001c0)='net/softnet_stat\x00') readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/11, 0x2}], 0x10000000000000dc) 20:34:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x0, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x0, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = fcntl$getown(0xffffffffffffffff, 0x9) getpgid(r1) capset(&(0x7f00000002c0)={0x19980330, r1}, &(0x7f0000000580)={0xc, 0x2, 0x89, 0x3, 0xca, 0xca2c}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$cont(0x20, r2, 0xfffffffffffffff9, 0x8) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:34:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x25a, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x0, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) [ 1927.807334][T17356] Error parsing options; rc = [-22] [ 1927.906942][T17365] FS-Cache: Duplicate cookie detected [ 1927.912697][T17365] FS-Cache: O-cookie c=00000000633cb7d7 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1927.923257][T17365] FS-Cache: O-cookie d=00000000f201baff n=0000000037f1bef8 [ 1927.930584][T17365] FS-Cache: O-key=[10] '0200020000807f000008' [ 1927.936856][T17365] FS-Cache: N-cookie c=00000000940ce8a4 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1927.945738][T17365] FS-Cache: N-cookie d=00000000f201baff n=00000000257a0c2b 20:34:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x25b, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1927.953081][T17365] FS-Cache: N-key=[10] '0200020000807f000008' 20:34:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pipe(&(0x7f0000000140)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x30, r3, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x9a}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20004240}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8000}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x20) 20:34:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x25c, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:34:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x0, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:34:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x119000, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000000)=""/107) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000100)={0x6, 0xff, 0x4, 'queue1\x00', 0x4}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:34:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x0, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1928.604285][T17754] FS-Cache: Duplicate cookie detected [ 1928.609870][T17754] FS-Cache: O-cookie c=000000006ea564f1 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1928.618912][T17754] FS-Cache: O-cookie d=00000000f201baff n=00000000ed66c9da [ 1928.626236][T17754] FS-Cache: O-key=[10] '0200020000807f000008' [ 1928.632587][T17754] FS-Cache: N-cookie c=0000000062142303 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1928.641342][T17754] FS-Cache: N-cookie d=00000000f201baff n=00000000f325f6f7 [ 1928.648635][T17754] FS-Cache: N-key=[10] '0200020000807f000008' 20:35:05 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='securityfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x25, 0x0) 20:35:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x25d, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:35:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) tkill(r1, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:35:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x0, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:35:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x0, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x0, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1938.340443][T17920] FS-Cache: Duplicate cookie detected [ 1938.346016][T17920] FS-Cache: O-cookie c=00000000f4a8378f [p=0000000049888e43 fl=222 nc=0 na=1] [ 1938.355070][T17920] FS-Cache: O-cookie d=00000000f201baff n=0000000034541d52 [ 1938.362792][T17920] FS-Cache: O-key=[10] '0200020000807f000008' [ 1938.369282][T17920] FS-Cache: N-cookie c=000000001b7740c4 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1938.378170][T17920] FS-Cache: N-cookie d=00000000f201baff n=00000000205209c8 [ 1938.385596][T17920] FS-Cache: N-key=[10] '0200020000807f000008' [ 1938.392700][T17916] FS-Cache: Duplicate cookie detected [ 1938.398262][T17916] FS-Cache: O-cookie c=00000000f4a8378f [p=0000000049888e43 fl=222 nc=0 na=1] [ 1938.407316][T17916] FS-Cache: O-cookie d=00000000f201baff n=0000000034541d52 [ 1938.414614][T17916] FS-Cache: O-key=[10] '0200020000807f000008' [ 1938.421122][T17916] FS-Cache: N-cookie c=0000000041b8cb63 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1938.429991][T17916] FS-Cache: N-cookie d=00000000f201baff n=00000000b1e2ae35 [ 1938.437602][T17916] FS-Cache: N-key=[10] '0200020000807f000008' 20:35:06 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x25e, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:35:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x0, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x0, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x7fffffff, 0x0, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) [ 1938.771479][T18339] FS-Cache: Duplicate cookie detected [ 1938.776955][T18339] FS-Cache: O-cookie c=00000000f2b21d42 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1938.785945][T18339] FS-Cache: O-cookie d=00000000f201baff n=0000000099cca6a7 [ 1938.793422][T18339] FS-Cache: O-key=[10] '0200020000807f000008' [ 1938.799855][T18339] FS-Cache: N-cookie c=0000000013aca23d [p=0000000049888e43 fl=2 nc=0 na=1] [ 1938.808667][T18339] FS-Cache: N-cookie d=00000000f201baff n=00000000335169a8 20:35:06 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x25f, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1938.815903][T18339] FS-Cache: N-key=[10] '0200020000807f000008' [ 1938.822785][T18338] FS-Cache: Duplicate cookie detected [ 1938.828389][T18338] FS-Cache: O-cookie c=00000000f2b21d42 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1938.837335][T18338] FS-Cache: O-cookie d=00000000f201baff n=0000000099cca6a7 [ 1938.844664][T18338] FS-Cache: O-key=[10] '0200020000807f000008' [ 1938.850979][T18338] FS-Cache: N-cookie c=00000000a80f3a21 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1938.859753][T18338] FS-Cache: N-cookie d=00000000f201baff n=000000004a3a4f26 20:35:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000f00f88)) msgrcv(r1, &(0x7f0000000040)={0x0, ""/152}, 0xa0, 0x0, 0x1000) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) getresgid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)=0x0) r7 = fcntl$getown(0xffffffffffffffff, 0x9) r8 = getpgid(r7) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x2, r8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000001c0)={{0xfffffc01, r3, r4, r5, r6, 0x0, 0x72}, 0xb9, 0x5, 0x80000000, 0x10000, 0x401, 0x9, r8, r9}) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1938.868457][T18338] FS-Cache: N-key=[10] '0200020000807f000008' 20:35:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x1914, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x1cd, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="cc", 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1}, 0x0) 20:35:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x0, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:35:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x260, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:35:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x0, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:12 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x9, &(0x7f0000000100)={r3}, &(0x7f00000001c0)=0x349) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001380)={r3, 0x39, "199b5ef3181358120a32ca07ef5ca7dc6053e4e114b8dc9ec95fc2844649fac0559d04c0d23c58bd19b557b31ea5a44dba42a8047928b21fef"}, &(0x7f0000001400)=0x41) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000001440)={r4, @in={{0x2, 0x4e24, @rand_addr=0x9}}, 0x5, 0x9, 0x6, 0x2, 0x40e}, &(0x7f0000001500)=0x98) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x9, &(0x7f0000000100)={r8}, &(0x7f00000001c0)=0x349) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000001540)={r8, @in={{0x2, 0x4e24, @broadcast}}, 0x9, 0x4, 0x81, 0xffff, 0x80}, &(0x7f0000001600)=0x98) vmsplice(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000000)="07bbe83d964726d50598863cac23ffe52c6120c38a56a10dc3e58b810700a19fcd81ad9192e9495c2c8438bca1abc1e97e2eeed8742bd73d1f89ad3bad2c20", 0x3f}, {&(0x7f0000000040)="87f4d3e3e027ee6a648e84a42c749d24d7a7a7fb2657f7ca3218bc4b2540084c01d067c6ac7d44607824a8220c0980fa3026d578aba1ff6ee53da4b359aa89fd5f0a44ac6a305396bebc3e7c58d14541b0", 0x51}, {&(0x7f0000000100)="52f674632352fdcd2e9320ffd62d2705921ba9930a1c877d6894c544a44833fbe5b34d4920116d8de7bb4885f21704b62389f05589ba1dd1ef7d0a95a94db7e9dedad3923f4e14d47ec422131dadab5c35a444b44b057f2ed982afdfbaa0f9ef43ef0b4b2e2ff1f7f695426b3c7c680d42c0bff16e55f1a068f27cbc5dd62fe6c11eb1a8ffcf3529c730f2b9ae34ed98a0123125823f65a74547b6648c848610f74c941229ee6c746641a8b16b1bb2d1b40016d4db7e8b0597f6969293e3a77ced7a3929fd1830216e2fa23c5bd12193cc1a9a06e430496c3b5e7c56cf3563b0731ebec5b314a6f05e9f73f9d74c13cddee5799570498d493e7e18041e44f2a34b3ab6c4ef2738bda3c0de33bb84448b425a56706e869a7e42de8fe35a6733e8dd2416fec472663d1ab32543d3120a0cc95a3895aa170c99c6a9336de504d03cf1af79878336a80a8a234f38a531894ff8b506289e4046acf3fed01f4a383870d06d15aa0f97625ae82c0abf7d87367baa9de7c785a17588dceb2c9cebc63650d5743aecb0ee0debc3c1ab1f0d7c3123e8d593ecbeaa9869d380fbd34161c80cb3e9fd37f5280712082e433ffecbf4c725257280cc7e3683ff763c448586ebcf7ebd03ea5039f9e8459fb17ecf2a2ace52f312c066a93c30069a90c300e628c3a090ff2687ec31ea0b09df29e7611ead0c9fa2f68254c068daddcd62d14c78ea0afe6e26d01e75ad9780cf9ff9f127d2ca39a51a5273cc643140e5b6db627f6be33a2589882bd1c0bf4a2a90b4c12de06622848e226c9473479aae556aa98ab5aec8c91ed34eca654450a792772ab13b6c45463743c2b301dccf64ff3ee2c2db466c19297b9c0e744013fda64c713eca8b79011fc69614cbefae70af07b0821b2ff8e707d9f22e5d4325711fb3ef7d5adac6cac4a7cdc0fc68cd57556dc56610febb68d23ad37f162df5941980ecbdfdb0f79e483d7556e095b70efddff8ba37b73070a0afbd762c1942e278c1ee932d8f3eae714041d961dbc15c0f54ff10ebec049c128f9cd30460f9533ff7ed7ec8d5d2b58265ed937632c26d6bae6d7216faa1b1cbe5eec827aa838e397d841e2cea20d249a55c230da42d136382a06d154d0463a23383943a94d47d4088fcf54c867d4009b9d2970d1e3ba0f9c51872a0fe24e737a3c95df313ba9486a17d76699a275d3a67609808e35c55c5d669cdfc752309355f7b7f56c2ba021f84836e05369cdd88b0161a5052cff7580d805a1beea178c6922cd32f7f14f244c112bc4b76688e911ee58cf50777925723842b6e09534d4efb50d84a1fb806fd86f6145ec605e4061381807215fd14df52b95d8d6bc6a1ade0a0d03e0c9f778b85157465d59ef7f5422545531845decd3ff73f68a2ca2a5f604d2c9d2386e0698c8623f8c180f05abd2805a6845ccc94a0c0fa31b1d30aabaa6dff9ca575016c37a235973b6d217d4a1b72c89ee6c714bf69539ce9ee0b22839e4568ac56ace28dad6ec00860c4c94c70b39bd525977d27b0bf96dc85a3c8f6eabda216fe65885be4c57e40a01b698c633237d0e01d65d21a688167094e2e58dd0e3089b3fb4eb7fe3c97361a3d5ba92be0b196a771de8204ee513f5c2666b382d6da9a7d60ac1a3b60c13d73309a3327a01bc92d6a5ced4cc76b14408661e0e94ad045af090981d4bf98b3508a9010ae51b41984b844df48d15acbdf2f60a222f5c08613a361509084e9076de56843f56cbfec7d4f7e3b0731a35ebca5d0e7718289788a6492bdbc51192e6c8ed12d2149956b7adb4d2ff39722b42a532b2e3c3f329b19764d815ebdaa294f1c4720004d9454b372e164f2daecc7ac0ed13bc1488b0a805e88035396e3da985f4b635d002029086501e29d995bc4a57353651f74149428658f6ba5789568910709b58a60ef65836a14f6cefac020f16c0058558bdcba5e1a9beaf04652a23a52f38a7ceab25e9c167dee24148a9b99bd71df3d66758513e8fada775074ce8066e0384a8ff5163b7726c48cdb5fe625aad364901ab3d55db30cda63b66292727aeec179f22e2c9b74e0734fd135bbbd86e90c9004146f1ca43cc74e4e08f7a968df77bd72488f7d6bb1e2abac738a7f3378951724ebd4dec11190f853a80cec4ec4b573668a000be18816e92b5b6c7cba8a21056b694e7178624443515d27993067acaeaf542fb0f8c807dfeb2970cbfcfce8f03e5a34cb3ef8f7d858b08abfa150f6801461d1e94d9e8042bc39ad05f7c09990fa23a60a72f28706965bdbb4ff307c6bc5f97161bd064f65d72a68733cb276b426056567f0a1b72c65362d416eb61ccb1d29c28273da043d8d3040ad5cd691cfe496080a7fa42a5de51cea606309e292d83b9b1c900faa990e2cfa72485ccaf5eda5f37cc4d30a890a1bff018e363796c8ea94f3c3862642e51e6be1a0d3cbd0a97be127e92bdfb0e6074ff9192f15ed419bbbe0fa2641b69f8d641d0f1b614d980dc6f02985ec436de9e6bb1a679f3532ee193e3baf5d586368e8924d2fae0043ac390a15635cd681dfacf70ccb3873b985ee06b657ab169e1d3d56f9d389a26e3567d31249588cc8f396563340f255af2bd8844a79ff287cb66c309089c1790a8ceb367b0a5ad25beaa53cd624e1e326669e8258a1e51e284b852fe02e6dbb9d6112e7af3f640c10017984ba5db2c4497ab8d848549492192de23b12a978645728a9210b762d9b2168c9a0f9c03392f00e9f6e0b6142c3b9a9c15db3c92956a76d6400abfcb5232e77be027bfde62be553295d90bba1044a2b0d6b02e78bc3728349ae8ead766d958758bed42b4fb5830818f8a4d850f33a82a10d6af86d7b62c7aea3dad59d912a6e0dcafd4766f143ae493d16ed11c8a2530f908f7ef8b9e9084ccc4a151313baf6da63810fa8a02e7047aeea88b22e0b3d9c32e1195b3d8729a292437ea5f91e95c6a5367091fbeafeb2d285f5f504ff5372cacec8581640830a9a95db7253d188a3bbf546fd28030a97ccbe91f4862ec86760c6f82a4d4d74d816e59ce5377c50e4b6968cdc1c0fcd120bb0b71e503681cc7681a34df11e7e45f7d0402ded42a3ed838c092a8cc52811f7c08bb8e9d4ce6dc06092502eb5961912619367d81f955ec18e3034ee5018ce2106fa618c4d97eafab4f2b20c314aba19ff48e8073a776c7c221eb2a9ec3505bc8893eb049dd635b59566fb344c8b12979ccf36361025e204164c8a45b7fde43fb3856eacbe25e05627c83d5397362a0d1020771ce4a2559dc7c714c0a37dfc0f537057f83126d87b374ce0521c109731daca3999355b36b562f6069dd8430a9db88434458783b3d5c097be2a08b1eedc57713962eee60e8c316efe8b045ac14649f333d6bcba1bf1eaa34641d43d14ad2f1b677565dabf732cff6ce4d33b7b8e6d90b28354b9a6dd8a1f2e4b5177a125540943e643ccd800b673f8fd1df6028f70d069a9a3afd47d0d4d823519b05f8c021b5e14d47a0b44e542767794531971b346b29023a4c43eeffbebd15063007e606a07728ec71ca55767b6fb86ea22036e93da01351cb37f269a830ad195571133b62f0c6c66762e75c8f8eb42ecfa1df9df93efe0d18296cd3fa332b21bfd8f3b68a89d237c275c530df423a6c094bbc9b225c147f10d5785528a8744ec2c8bbdc9dded808ae5aca78702635a34083c092bbd741bd668a0aecf72696587e7e47256165fb3954eb11d268801d951ee05ca693adcb6fd769d0b2927e79451260c5b5c06eecd971e9d01934374b11cecff36e14973b2020da08d883cf30d75cdbf0c1389d1181b5edd4e1b1b194a0449261a490d4239b597a7c90f8a39812790986ae3233a32476ac9c40a75863fb17d1d1ef6a18cdc3bdbd13c108fc3eb6c69ff0e987d2ee0085a5acbcc18fb9f636eb0357eba3df35a3d9d49a558d57acce1f2439b801ca522a03f8850274932e38d179deb9f04dbd927d7c1c6f6ae825bfe5bb060b7b2843e9310c7022ef44a813d048a9df5f6340e77dc4f051a256d61da9303b1ba5f38b46e307638fb76bd4aa9b51ea9ce7bc3b53f7a13a2bb4fef6dcba50b4061cd99feda7eed3915296649c79a6ae102d48494eb757a5b7a1f38045fff2541851f7e0b9b3e6420eacb659061797cb3553815a51355e9e1e66084484dc6ca6f7a7fcee9b86f97932514371713854340591054ccf11f740d4623ca38e1a19854abfc284842c815c79a8f93436dda8b9eb9e0f44e38556c0a4c4ac3545eac39866b07669caf08d0a9f462fe66fbd78fc01bd2e787e6e47af9176a734088c3b97865fd0acb5bf41141a275cb7c5c52c2ad4524cc79a0ae8d0b8541f991708f32fb00737ee61e0d1a383d8b019ccdb2a262f1db57487d830cb3d37f574aff9d6e920f83bd51b4cf430501a11090654827ddb2ef7cec3494cbf942cd0c145bdc6b4db63ae13ae4b5430c8efe3cea8ac4849f2f419f1b95a8be916bc84564d90302137e2650acf13e826e7e21e0ccbf28b24a03cd118c632190eea72eb8921b1e4359a0d6c2fa52badcec4441948d8457f287e39655368a663f0afc8b9c1efc86dc5a9f0da5a27e0f46fd0e1f75b93eab0ad33061fa9fe54df23caf2ee0ba4fc937918c867713eb39e9b07ffd66af54948e83f91e0a743d3c900c9d01d8cc2508eb189134ee466434009513616ebd67a30cc7bb9fb2a17324039c7b249d5c14c735e6e7776c364364b80391c5f277af8e85d488ddae5ab85b1da9fb29f86b9bdb4b2091d1e3b1a3494f25ae73e2c6fa341c28d003defaeffd749cda7b6df183a9e4a8fa58111d2bbde5f24275b0992cf8c80a5291140912a67c39ba10593a463b253c52b480332c5daaed85b549826863a0f709b335c78840449d94ec82bb5fc3da6caa3c817fbdd9598c65657861473ac811d5648c0274655d983c34ae5f33909753557c9530b577a0543363d463b86667df2e24a29017f86ac01d4723d5b864ec90f2af6d95dd4a6ddd0815be4134cb7d8ccaa12c8a68d51bcf100445b4761e040902c707c2e3d5d0b621d418eb5269494529e601df65d94146b9de9a4f5efff7b8c3e4e7f46a88ec9e2c0e670b369f65efc6dcc6a48cb06f044d541a5123e915f1dbee7a5e628804120cfa90f4432a9c67f37858c9961d43678f22b36a89b4ad8226dbce39ef003f1711a6f8c943455629cdc6d1b2cbb9c86b343c0620285ff4c87ed07832162cdfbac5bbac27ede89e1618a9fdfeb639107e6cdd004920d7f6b07ac604e996cc45453ea47ce70387a18d5b2728b51388d39c59717ad43eb3887e4cb69e70b7b771eb96781e3924b730c795f5982bd973090b1c79c8ad66bb79e6067fd093cf9a67e9e1fe13e3fe6bafef5d033bd0b76e39150cc0a7da6078251d628d9c7e4445c16011a592ca0c68a6e79f58fe912922dfcc41bef215712ec4e952cf8980eeabd750652e97d8fb69d2271abd83cd425dc59ccc0cc9b6d46e31f2763eefb1de7561ee02b4046ee6b26c0f0fe563b79af395a113e4c6b6fc2e432e9ce1bebdfe96b256c9fddf1a0d967b6821d97c425ef29dba3baf020d90792c3da139fd151684bc593026b3b6afae337ca62d2b308d34d6dae4be27470238092fe8fb5ba047065ebef24ea3fa7e3d00c6b358c1f3e60b6820c1ab95ff90e82f9be56d445473f87b16110a0ba6cd06beda1060c0b11734f12bfbf0b364754af3837b1528c58884608fc066fc311107b282993b4758d41337fbd564b973a6d8d7592cde82f8aa10fb9e7a8521ef14288afa82ee8f11", 0x1000}, {&(0x7f0000001100)="fd94c004c55ba3bcfc643588b309c97613301521aa7bd90df30df45fa079596bf4978903503ce8f9c5d688536117af3acdb28b4efd8251fafc93a2c85886fa4572f348687b8deabb6fd617a8468c6aa9b7752cd0192045736c149ec0249640dd6b34634d3d1a044f3e4c08cee7ca4b91c9c9a2ba39adf669f31a68dd8ac585880aae4b78d79fc49f0f6b208b8eb99146e2d574b26a729ea0fca841c5f1be8a6eede0a5b82dae2bbf26a18292b0f4252279c6b975d945e612fc62b71f0f0d3b63af52172b3306c1cf3cab8892d7ddf6eeb7e7a817a04d13610b2c7814df", 0xdd}, {&(0x7f0000001200)="cc6c", 0x2}, {&(0x7f0000001240)="0807b72d499e24de24195976a0524cbdfa47663281549495817eac55", 0x1c}, {&(0x7f0000001280)="5fa39ca7d6b1205f47c8558c7476b3fa297c8c6b52f1fd60622712d5938cf8c38866f5bf1372dd882f3be0434df2ab6c02bbebd757bb12580ad051c4468d5a65af75a86f5d8930200d9e485a5717851274e334d25bc7d5a9d1", 0x59}], 0x7, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r5, 0x0, 0x0) 20:35:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x0, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) [ 1944.677398][T18667] FS-Cache: Duplicate cookie detected [ 1944.682881][T18667] FS-Cache: O-cookie c=000000005447a83e [p=0000000049888e43 fl=222 nc=0 na=1] [ 1944.691915][T18667] FS-Cache: O-cookie d=00000000f201baff n=00000000d7fd7f42 [ 1944.699261][T18667] FS-Cache: O-key=[10] '0200020000807f000008' [ 1944.705505][T18667] FS-Cache: N-cookie c=00000000dfbf47e5 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1944.715149][T18667] FS-Cache: N-cookie d=00000000f201baff n=0000000090e50194 [ 1944.722451][T18667] FS-Cache: N-key=[10] '0200020000807f000008' [ 1944.728963][T18668] FS-Cache: Duplicate cookie detected [ 1944.734438][T18668] FS-Cache: O-cookie c=000000005447a83e [p=0000000049888e43 fl=222 nc=0 na=1] [ 1944.743470][T18668] FS-Cache: O-cookie d=00000000f201baff n=00000000d7fd7f42 [ 1944.750739][T18668] FS-Cache: O-key=[10] '0200020000807f000008' [ 1944.756991][T18668] FS-Cache: N-cookie c=00000000ef49a26b [p=0000000049888e43 fl=2 nc=0 na=1] [ 1944.765813][T18668] FS-Cache: N-cookie d=00000000f201baff n=00000000ed66c9da [ 1944.773208][T18668] FS-Cache: N-key=[10] '0200020000807f000008' 20:35:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000080000006a0a00fe000000808500000026000000b70000000000000095000000000000006eace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c5385b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5b34d3239d6ef237b219488b43d269dbb5b6f5b75bd349523c9994ecfdc8d354afd088f814084fb348312816bba27809997a98436c27cd52290d79086001a232a3c1acba7fae7d2552f1c2dec89d623df1ae52f50aae07096ff25760d9ae981cfeb5038f122e2ea5bc58af5a429795d155b50509be1620db037a743f3d30f3da3f1acd40642bb004ee632822aec716aae4e46fa00f30234c84c420cf7913ca0e238ca85cdf5fefd89d332c4c648a47273ca7fe02e9da249cce4ad2d94ce4527d88948d1584cc46b5e521c3aa5f274d3a9b97aa98532f94b5dae2e54f874f7543c16bfcb66bc85da14cd8796e3be4c174b789a0fd6c5fa9f9376ec4df390d3ad0ac03c442f51387377f3d8495cd3a7dce4182171dac43baf2e1e2178ff1c46787c3ee54af8a8f451dbe6524e71f3dd001b906fc42937776b3062463521eb3e1e6c3091ae43d4ebfdd952c69c0dbe8e8e4801bb9fef37250e250411b63193e00000062751a7426c6e73a96b53e45751e3842bd9b568e7ceccf7e476639b1c41607cff7bb2b1ca2afd71f9f7409ba3c3df2d53b1b45471e4226c228705614a8d4ce83303ed33e492d7eab7834e44fb1505ab9e683538865340000000037000640117b90240a6083aaa072de64d459de2ca6012e658dc7097745032013309ce24e07313d4bb35b2c8f07211b6c466673fd375322363f267b7c7f7d4c0facaa99e4b9e4cd80956286e13fd6a80b0cff14bc2cc30ce3b73e5dde1052b9b0139c04e0251a4486c41d65eb2782af3f2fbdf08eb8803a69e71305bb79d3f8b4d72d76d90d401fdedc8c055abcf95395d9bcdf40f864309cf3d9f573a5dc73dd147d29499d24292d4439757c23fee0a0892f10eba4cb0335a28f8814d5a48245c703dbfcc677bfacecd37c9702ed174a7d56fc5b26458273e3137dff9f757e44184845abf85c5b22bc21c5198a817ca0c2e1d2b80ac75acd8811c32bf85d3494cd8af83e40d9c856d8ce00b5cdc965ba0b39289b5ce5a459350bd3b9ac29e92fccabbc81df4e9a198f720b45316abc07abf54328a7c3a7897d8c8727b2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x261, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:35:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x0, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:35:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x0, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r2 = socket(0x40000000015, 0x5, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) bind(r3, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) bind(r2, &(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6, @mcast1, 0xfff}, 0x80) r4 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x441000) r5 = socket(0x40000000015, 0x5, 0x0) bind(r5, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r6 = socket(0x40000000015, 0x5, 0x0) bind(r6, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000140)=0x0) r8 = socket(0x40000000015, 0x5, 0x0) bind(r8, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) fstat(r8, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() setregid(r10, 0x0) r11 = socket(0x40000000015, 0x5, 0x0) bind(r11, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r12 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x100) r13 = socket(0x40000000015, 0x5, 0x0) bind(r13, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r14 = socket(0x40000000015, 0x5, 0x0) bind(r14, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r15 = socket(0x40000000015, 0x5, 0x0) bind(r15, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) r16 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0xa9100, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) r18 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$netlink(r1, &(0x7f0000000480)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x1000110}, 0xc, &(0x7f0000000100)=[{&(0x7f00000013c0)={0x2404, 0x26, 0x20, 0x70bd26, 0x25dfdbff, "", [@nested={0x64, 0x8d, [@typed={0xc, 0x68, @u64=0x9}, @typed={0xc, 0x0, @u64=0x9}, @typed={0x48, 0x3e, @binary="02ddcdad05aef4d0dd7260ca1fc9c711d2b6d320b37fbc623092318f9cf8dc5e1726e250f4a64c4bad4c6d35604487cc2ebc76d806dfe997362c84ee18116dbb08"}]}, @nested={0x221c, 0x4b, [@generic="c9eb7e3fd3b15db25ee34b7cac3be737a14ac57df0b98a9552054178d2470d7483ffc60282d9608365975009ac1867bd3a45a11a7787f1554da13ebe3c790053356d1e8460f392ab95419863c55c06046932c32707e549ab2271b547bcae1061ac3b6eaff9241d6e2be363348b3ce62cc35eb58e155d249c07bd76ccf75e0d115582c67d8921a44315f0c27bd217eaf408d218e0f3a4c6bffdae05b09925e00f736dbc72097d6a0f1d51042bf735c16a971c7af74daac0273bc5f5835b0b63518e6534614cfaec0861a786ccf21a99cd24e02d8d7d37048801e831ae7b89a2d03a91f11d07505ba32011fbcf596bb6c8ce345d2193f5181717", @typed={0x8, 0x6d, @fd=r2}, @typed={0x14, 0x90, @ipv6=@mcast1}, @generic="7178a80bc0c6538adddf9f21835ebe1ae5d3484869d2baa3daebe83a622fb2a81b54bfd259d5ee75d9faaf19b0fdf5b0f953d969fb9bf9d11882709441fbbf8dd748ac191ccd8060ed70aae2640de3ef56df91cb576cfad3e549c7a2ce26fa44f536f5e6822164f7980c55f232f004285b8db4f9", @generic="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", @typed={0x10, 0x6d, @str='user+-eth0\x00'}, @generic="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", @typed={0x8, 0x63, @str='(\x00'}, @generic="d4db227c40f2cad5b0079744297ad4c389d2b5207b2db0bf929291b9693c937fcee577d8f10c7a6c60abb26b2342b46a16e37448b983a63747a6ec1270160da068641c1e6be98b9f569b4e378e471830102adba1", @generic="98938b0423363db3f99809812835d0eba928b0b65d1501600bbb95795966af48"]}, @nested={0xc, 0x56, [@typed={0x8, 0x53, @fd=r4}]}, @nested={0xb8, 0x49, [@generic="59ba9ca4bd2e32d1e3abd3a30500b5b1dcb884ac7ac9438173687d1220c5d0fcf58f9b0a4a0ad8b0416b8bc458e082169a388733271e6eb6c9285ca6d175f5c16068bcb61b1aebc6e576b1b9644fa58b", @generic="fbdd9590e546b071937fee2c032b6eef9afeeb4bd19e70ade23807a5d5fe42d7aa0bb131119798a85a24e160588cf1ea74a6ccb2b87021f63e30f241e926ace9022ee5a3fb490a15bfe33ec010718046102486730f82536f8a7309b204dd8f0f9ce0ff"]}, @nested={0x1c, 0x36, [@generic="fa4c04755b8259bef23b6d8fa2b2d081defb10749b"]}, @typed={0x34, 0x96, @str='\xa2wlan0eth1md5sumY+bdevproceth0@mime_typebdev\x00'}, @generic="af3ecea4c6bd09b619980f52a8d265462167be042b6ab147033ceba336c75e14ade10e2242847da4478ba0c8768bf2137d68d10a03c071c6830d20bafb6409827ca3a3eb4145378b561be29cfcdabe5328b05f85f4af025ee0d63456e0300f"]}, 0x2404}, {&(0x7f0000000080)={0x1c, 0x14, 0x200, 0x70bd26, 0x25dfdbfc, "", [@typed={0xc, 0x5d, @str='nodev\x00'}]}, 0x1c}], 0x2, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {r7, r9, r10}}}, @rights={{0x28, 0x1, 0x1, [r11, r12, r13, r14, r15, r16]}}, @cred={{0x1c, 0x1, 0x2, {r0, r17, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r18]}}], 0x98}, 0x200000c5) 20:35:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x0, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x262, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1945.262174][T18986] FS-Cache: Duplicate cookie detected [ 1945.267867][T18986] FS-Cache: O-cookie c=00000000858fc009 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1945.276801][T18986] FS-Cache: O-cookie d=00000000f201baff n=0000000081cfba0b [ 1945.284376][T18986] FS-Cache: O-key=[10] '0200020000807f000008' [ 1945.290805][T18986] FS-Cache: N-cookie c=00000000c72680c0 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1945.299601][T18986] FS-Cache: N-cookie d=00000000f201baff n=000000002ad1398e [ 1945.306945][T18986] FS-Cache: N-key=[10] '0200020000807f000008' 20:35:20 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) munmap(&(0x7f0000000000/0x400000)=nil, 0x400000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:35:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) r5 = getegid() setregid(r5, 0x0) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() write$FUSE_DIRENTPLUS(r2, &(0x7f00000016c0)={0x160, 0x0, 0x7, [{{0x1, 0x2, 0x1, 0xffffffffffff1568, 0x5, 0x7ff, {0x1, 0x262, 0x100000000, 0x2, 0x78d35d1e, 0x1, 0x9, 0xffffffff, 0x4, 0x2, 0x400000, r4, r5, 0x3, 0x7686}}, {0x0, 0x4, 0x6, 0x3ff, '\\(self'}}, {{0x0, 0x1, 0x9, 0x1, 0x9, 0x7, {0x5, 0x1, 0x9, 0x7, 0x3, 0x1, 0x7ff, 0x0, 0x1, 0x6, 0x3b9bc583, r6, r7, 0xc3, 0x5}}, {0x5, 0x2, 0x12, 0x8, '/dev/input/mouse#\x00'}}]}, 0x160) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = gettid() r9 = syz_open_dev$mouse(&(0x7f0000001380)='/dev/input/mouse#\x00', 0x80, 0x4000) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r9, 0x4040534e, &(0x7f0000001580)={0x166, @tick=0x5, 0x5, {0x1f, 0x28}, 0x8e, 0x0, 0xf9}) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001500)=[{&(0x7f0000000100)="2bff2d85c02c18130d30f1dd68ca90d2a5ba231419a7559cf4bfc56da4f40c7d0fe3d33a5dd99593fa5fc74b7d52e9eb0fc2516bdc4a945bde349fa0b94cbbefcf7c077b3a65ab729272f4ae4cc7530707ee0ad21b9ca557e2b388ceb895293f0bf9cea789af9c30778cf202022733fb5451bd2550b612ad8d06e03d8527e697b2005fb540a084ad3c8e369bb25b58a13dd1542439a9b7456c28d0d040d71884ed45879bb830d08bf1949af637e2b5f5becff756efa7a10b804efec3eedef3ac2ff557aaa4162abb14b8be6a264bc0bf1ee20f959ea69f72253ba500e1ed453b04c59eb391c5bcd7", 0xe8}, {&(0x7f0000000200)="408d6d4444dbe01e033fad37a45fe512ba7441a915c3fe1403621f5300a304daae1a5ab6debeb031b8e5e49cdda010628f8cf1b7188a08e3c15acbff6e15b3c7c22b97f74b17d170890c0784bab06a323c7d6335747a29061c3767e6e200976d32738f7e48504c58135338e51a0f6e9d5a58566c23870187f146b9906dcf735eef9359c5166e5141d25809a7fcd7e7b13158a1fad69c6b4391195745162d27b838570e0df5b277e0b97141ab73541db487ee9b10718739eaf5b2c6871c51f037f005231dafe393f793c48eddea229d7a974ba6331460bfa4cf81fe0c85c34c2bd9878f9f", 0xe4}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000000000)="7c725bf1ceb5599bad285e1a4ba3f28e8e8011b8af7d948e0ca2b187f278655b6aa3736a3587dab9ce7b01e963af75f8aff8cd0b555d0f38173743e89851b1362fdcc1108e977359a2bcc75c20345ab39653089a8b738cd1266a0eba3af58878c43fe2cf14a83a0a61bd1a28722eec7dbe026ae5370b95e39c938cbecea71a9db7e25d9daca6fb", 0x87}, {&(0x7f00000013c0)="3419b22b64e4cc5e429d45cbbac0b2ec1cde9b9dd516988bc0053f42e27b396bed2768bb57e9d4f212c4e82511175b4611d24e91dec69c351a7ad6b3842b6bb94b6356dbaee9e872b9165f98d5de80025d7ba189217518be7ca4a06011bcee6e1de7798aa542bb3dd437082d93444302ec641812be77a33499ef5bd4773d833bc0057f4cefce7a8ba2d42ee3af08ab5ac1e79d0a7361265881a7d8b12fdc030f76060743abdf", 0xa6}, {&(0x7f0000001300)="29d8a9bdc03b5d782d2dd4577cd3ba0328877dceb7629ec61b80ff7e6b51b35f50982c264c6a70066ff26ae34364a65e5da0a64544d640617d33b91370a94f7bb673729eafd0c2c284129cd8905126ee5fee95da950532ae8e3efbed9217f11645f15a2c", 0x64}, {&(0x7f0000001480)="4fb2b547e1ec38e26fea22008a17f585be52a254318958dc86cf30ae4f1c8538f254be4afac1d4bf3263bdafbb0522c8c2d7", 0x32}, {&(0x7f00000014c0)="6b9978c2cc407dd05229a1d0547d2717242283d041071de9ab", 0x19}], 0x8, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r8, 0x0, 0x0) 20:35:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x0, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x263, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:35:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x0, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x80000001, 0x0, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) [ 1953.067323][T19316] FS-Cache: Duplicate cookie detected [ 1953.072854][T19316] FS-Cache: O-cookie c=00000000090878e1 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1953.081910][T19316] FS-Cache: O-cookie d=00000000f201baff n=000000000e38662f [ 1953.089174][T19316] FS-Cache: O-key=[10] '0200020000807f000008' [ 1953.095566][T19316] FS-Cache: N-cookie c=0000000076e8d4b7 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1953.104377][T19316] FS-Cache: N-cookie d=00000000f201baff n=000000004c5be15f [ 1953.111683][T19316] FS-Cache: N-key=[10] '0200020000807f000008' [ 1953.126800][T19317] FS-Cache: Duplicate cookie detected [ 1953.132695][T19317] FS-Cache: O-cookie c=00000000090878e1 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1953.141674][T19317] FS-Cache: O-cookie d=00000000f201baff n=000000000e38662f [ 1953.149904][T19317] FS-Cache: O-key=[10] '0200020000807f000008' [ 1953.156216][T19317] FS-Cache: N-cookie c=000000007c55e4f4 [p=0000000049888e43 fl=2 nc=0 na=1] 20:35:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x264, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1953.165028][T19317] FS-Cache: N-cookie d=00000000f201baff n=000000002ad1398e [ 1953.172461][T19317] FS-Cache: N-key=[10] '0200020000807f000008' 20:35:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x40800) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x7) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) fcntl$addseals(r2, 0x409, 0x7) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:35:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x265, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:35:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x0, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0xddb68d6322234a13, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10082000, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000240), 0x2, 0x0, &(0x7f0000000280)=""/103, 0x67, &(0x7f0000000300)=""/139}, 0x40) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e22, @remote}}, 0x0, 0xbeff, 0x0, "53698b490165ee46671d9c98dea497a884a526774c9d5694d2d3a204fd3c246cb5feb064533c85498e4979a292d25efc6d674f89c7b650140ac926cf223daa4cace59f17532ce9e966921cfbe8f65416"}, 0xd8) 20:35:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x0, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:35:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9212}, 0x4}, 0x0, 0x4000000000000, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x7fff, &(0x7f0000000140)=0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x20) 20:35:27 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x266, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:35:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x0, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x2, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:35:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x0, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x0, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) [ 1960.392992][T19967] FS-Cache: Duplicate cookie detected [ 1960.398798][T19967] FS-Cache: O-cookie c=00000000391c8a0a [p=0000000049888e43 fl=222 nc=0 na=1] [ 1960.407828][T19967] FS-Cache: O-cookie d=00000000f201baff n=00000000619a236b [ 1960.415178][T19967] FS-Cache: O-key=[10] '0200020000807f000008' [ 1960.421548][T19967] FS-Cache: N-cookie c=0000000065a570f6 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1960.430468][T19967] FS-Cache: N-cookie d=00000000f201baff n=000000004da220b0 [ 1960.437766][T19967] FS-Cache: N-key=[10] '0200020000807f000008' [ 1960.444828][T19964] FS-Cache: Duplicate cookie detected [ 1960.450754][T19964] FS-Cache: O-cookie c=00000000391c8a0a [p=0000000049888e43 fl=222 nc=0 na=1] [ 1960.459723][T19964] FS-Cache: O-cookie d=00000000f201baff n=00000000619a236b [ 1960.467000][T19964] FS-Cache: O-key=[10] '0200020000807f000008' [ 1960.473380][T19964] FS-Cache: N-cookie c=0000000098bd68e1 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1960.482266][T19964] FS-Cache: N-cookie d=00000000f201baff n=00000000f4bf8b8d 20:35:28 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x267, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1960.489645][T19964] FS-Cache: N-key=[10] '0200020000807f000008' 20:35:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x0, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xf, r0, 0x6, &(0x7f0000000000)="85f843282fefa5455f2931649fa6d60ac638f2edecc37b7fe114688bff816a9618c39b9d0fab8fcaacb47d5835a0766505604f157d57a359cf7c4b9758ebc0b47f0b3e9a8ecf49c9c4669dd176ae7dc89324718bf3adef89dfc9d8b1dde986055776343d37929cdf7b42c8a728aeda09d6f7dd218c76067c0401e7bc502291a2d85d63eb8d49f7ffef") ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f000000a000/0x3000)=nil) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_LOCK(r1, 0xb) shmctl$SHM_UNLOCK(r1, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000880)={0x0, 0x0}) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000008c0)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) fcntl$getownex(r3, 0x10, &(0x7f0000000a80)={0x0, 0x0}) r8 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r9) lstat(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) lstat(0x0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r12, 0x0, r13) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000300)}, {&(0x7f00000003c0)="461b173c1daf6fd3514b07e58b123ee40c55eb9586082bf98076ed45f0a0344a8b3366c25b10c962569d34684addf1078c3af1132a862f36a4917c2b837f86361a1bfcf81b8859a44fa1a3aaecc79b2c8c0537df9ff0d2322077077298d6ad2bb54b82009d4dbc3242", 0x69}, {&(0x7f00000004c0)="f50f9a7b4ce88e54dc2a455658e089b0e875dc6bfd3655d564bbccce2ffd3431cbec846dbad0b2641cf02ef5c3d8d60e28c58f33f53d85931b285193292fd53e93216ef9f0db3158964d46e82c2273c3b47d125a8b00eb64aa10ec10dcbb604b208a851104b1c77da7b34b251653815e2ff3c1a026add1c595282fb98b4a01bfd1250b8a5e55f273619d614b4c9e311f151a4e77e0d13002d87ee19855d4ae9c7a236129763fdc694e0000e612dec3a37e2e3d4d500e309196f5fc836cb2d74bf4648fd528633f92c3884d88dc8568", 0xcf}, {&(0x7f00000005c0)}, {&(0x7f0000000600)="ec76a3f747a262cde274cc24f17877ae1d43e3b2e0d628062a905956de27e1cf4e22cd6445e1230ae931eeae4ab26a5b7f684488c300ffb1c1f541e3c2738aba3af9e1270b423754a131419b4c930c033ecd3cac873f9fef2aa5ccb8c93d22add1df16b1a8d9b6544e6583c1b2f6df6a31d10b8cff5e9b587d66b2449b255c07ff51889355968a84cbeaa1c113fa663c537031cd03440ca70c38e303793485a521d109eacaa58178a34692a7ac2995b10ff942e87771ecac491c0df3e00a1c8969fe34ccb1c8f2a5a1c25cef841b1be20bf94bfd237ddef0fbfbf72dc38102bb4b52c81e268506dd", 0xe8}, {0x0}], 0x6, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r4, r6}}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r7, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r11, r13}}}], 0xa0, 0x4}, 0x6010) r14 = socket(0x40000000015, 0x5, 0x0) bind(r14, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) shmctl$IPC_SET(r1, 0x1, &(0x7f00000002c0)={{0xff, r2, r13, r15, 0x0, 0x48, 0xc}, 0x2, 0x2, 0x1000, 0x3, r0, r0, 0x80}) 20:35:28 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x268, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:35:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x4, 0x0, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:35:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x0, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x269, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) 20:35:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x843, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000040)={0x675, 0x0, {0x0, 0x0, 0x4, 0x2}}) wait4(0x0, 0x0, 0x80000002, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x5b6d987b88dfddab) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0x98}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479ae", 0x35}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:35:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x0, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) r4 = socket(0x10, 0x400000000080803, 0x0) write(r4, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) 20:35:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x0, 0x4, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) socket(0x10, 0x400000000080803, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) write$cgroup_pid(r0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{0x7, 0x1, 0x1, 0x10000, 'syz1\x00', 0x8}, 0x0, [0xffffffffffffffff, 0x8, 0x46c, 0x80, 0x400, 0x6, 0x81, 0x100000001, 0x8, 0x20, 0x0, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x2, 0x9, 0x9, 0x0, 0xa000000000000, 0x80000000, 0x2, 0xfffffffffffffffa, 0x39, 0x3, 0xfffffffffffffffa, 0x200, 0x2, 0xffff, 0x5, 0x1f, 0x3, 0x10000, 0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x80000001, 0x9, 0xcb88, 0x2, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x5, 0x6, 0x1ff, 0x69, 0x1, 0x10000, 0x7f, 0x5, 0x4, 0xe177, 0x4, 0x2, 0x3, 0xfffffffffffffffb, 0x689, 0xc61, 0x127f0000000000, 0xfff, 0x6, 0x7f, 0x3, 0x7, 0x7, 0x2, 0x40, 0x100000001, 0x6, 0x0, 0x7, 0x7, 0x6d2, 0x1, 0x1, 0x4, 0x10000, 0x1, 0x1f, 0x1000, 0x9, 0x18000, 0x401, 0x7cc, 0x0, 0x80000001, 0x7fffffff, 0x5, 0x51c, 0xffffffffffffffff, 0x1, 0x7, 0x3, 0x0, 0x2, 0xda, 0xfff, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0xffff, 0x3, 0xb0, 0x3, 0x800, 0x2, 0x100000000, 0x8, 0x9, 0x401, 0xfffffffffffff533, 0x4, 0x80000001, 0xfe00000000000000, 0x4, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x1, 0x8, 0x100000001, 0x4], {0x0, 0x989680}}) r3 = socket(0x0, 0x2, 0x0) write(r3, &(0x7f0000000240), 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2", 0x37) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000302010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xffa6) 20:35:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9212}, 0x4}, 0x0, 0x4000000000000, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x7fff, &(0x7f0000000140)=0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x20) [ 1969.028504][T20613] FS-Cache: Duplicate cookie detected [ 1969.034064][T20613] FS-Cache: O-cookie c=000000007d766f09 [p=0000000049888e43 fl=222 nc=0 na=1] [ 1969.043233][T20613] FS-Cache: O-cookie d=00000000f201baff n=00000000fc925b57 [ 1969.050884][T20613] FS-Cache: O-key=[10] '0200020000807f000008' [ 1969.057206][T20613] FS-Cache: N-cookie c=00000000021ef4f5 [p=0000000049888e43 fl=2 nc=0 na=1] [ 1969.065954][T20613] FS-Cache: N-cookie d=00000000f201baff n=000000001004cf16 [ 1969.073330][T20613] FS-Cache: N-key=[10] '0200020000807f000008' 20:35:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x4011, &(0x7f0000000080)="b9ff0300000d698cb89e40f02cea", 0x0, 0x26a, 0x0, 0xfffffffffffffd9a, 0x35d}, 0x28) [ 1969.222693][ T8107] ================================================================== [ 1969.230843][ T8107] BUG: KCSAN: data-race in xprt_connect / xprt_unlock_connect [ 1969.238896][ T8107] [ 1969.241221][ T8107] read to 0xffff888055abc4c0 of 8 bytes by task 20613 on cpu 0: [ 1969.248844][ T8107] xprt_connect+0x318/0x3a0 [ 1969.253338][ T8107] call_connect+0x118/0x1a0 [ 1969.257830][ T8107] __rpc_execute+0xf5/0x640 [ 1969.262321][ T8107] rpc_execute+0x1b5/0x1c0 [ 1969.266724][ T8107] rpc_run_task+0x379/0x440 [ 1969.271212][ T8107] rpc_call_sync+0xa7/0x130 [ 1969.275700][ T8107] rpc_create_xprt+0x376/0x3d0 [ 1969.280460][ T8107] rpc_create+0x296/0x4a0 [ 1969.284780][ T8107] nfs_create_rpc_client+0x348/0x3c0 [ 1969.290051][ T8107] nfs_init_client+0x69/0xc0 [ 1969.294625][ T8107] nfs_get_client+0x83d/0x8d0 [ 1969.299290][ T8107] nfs_init_server+0x1c0/0x790 [ 1969.304039][ T8107] nfs_create_server+0xcc/0x3d0 [ 1969.308880][ T8107] nfs_try_mount+0xa0/0x560 [ 1969.313389][ T8107] nfs_fs_mount+0x7cb/0x1580 [ 1969.317979][ T8107] legacy_get_tree+0x7e/0xf0 [ 1969.322559][ T8107] vfs_get_tree+0x56/0x1a0 [ 1969.326964][ T8107] do_mount+0x1049/0x1560 [ 1969.331295][ T8107] ksys_mount+0xe8/0x160 [ 1969.335529][ T8107] __x64_sys_mount+0x70/0x90 [ 1969.340113][ T8107] do_syscall_64+0xcc/0x370 [ 1969.344606][ T8107] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1969.350476][ T8107] [ 1969.352797][ T8107] write to 0xffff888055abc4c0 of 8 bytes by task 8107 on cpu 1: [ 1969.360411][ T8107] xprt_unlock_connect+0xa5/0xe0 [ 1969.365338][ T8107] xs_udp_setup_socket+0xf7/0x390 [ 1969.370350][ T8107] process_one_work+0x3d4/0x890 [ 1969.375192][ T8107] worker_thread+0xa0/0x800 [ 1969.379681][ T8107] kthread+0x1d4/0x200 [ 1969.383762][ T8107] ret_from_fork+0x1f/0x30 [ 1969.388154][ T8107] [ 1969.390478][ T8107] Reported by Kernel Concurrency Sanitizer on: [ 1969.396623][ T8107] CPU: 1 PID: 8107 Comm: kworker/u5:1 Not tainted 5.4.0-rc7+ #0 [ 1969.404238][ T8107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1969.414299][ T8107] Workqueue: xprtiod xs_udp_setup_socket [ 1969.419915][ T8107] ================================================================== [ 1969.428048][ T8107] Kernel panic - not syncing: panic_on_warn set ... [ 1969.434626][ T8107] CPU: 1 PID: 8107 Comm: kworker/u5:1 Not tainted 5.4.0-rc7+ #0 [ 1969.442240][ T8107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1969.452305][ T8107] Workqueue: xprtiod xs_udp_setup_socket [ 1969.457927][ T8107] Call Trace: [ 1969.461212][ T8107] dump_stack+0x11d/0x181 [ 1969.465538][ T8107] panic+0x210/0x640 [ 1969.469428][ T8107] ? vprintk_func+0x8d/0x140 [ 1969.474033][ T8107] kcsan_report.cold+0xc/0xd [ 1969.478627][ T8107] kcsan_setup_watchpoint+0x3fe/0x460 [ 1969.484003][ T8107] __tsan_unaligned_write8+0xc4/0x100 [ 1969.489367][ T8107] xprt_unlock_connect+0xa5/0xe0 [ 1969.494318][ T8107] xs_udp_setup_socket+0xf7/0x390 [ 1969.499337][ T8107] ? sock_def_readable+0x140/0x140 [ 1969.504451][ T8107] process_one_work+0x3d4/0x890 [ 1969.509298][ T8107] worker_thread+0xa0/0x800 [ 1969.513812][ T8107] kthread+0x1d4/0x200 [ 1969.520233][ T8107] ? rescuer_thread+0x6a0/0x6a0 [ 1969.525082][ T8107] ? kthread_stop+0x2d0/0x2d0 [ 1969.529754][ T8107] ret_from_fork+0x1f/0x30 [ 1969.535679][ T8107] Kernel Offset: disabled [ 1969.540003][ T8107] Rebooting in 86400 seconds..