x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed5039478d61a9b484b597fc35036cf6e12bb0c2123c3e0c96a24d9feabd"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) [ 296.707268] netlink: 1080 bytes leftover after parsing attributes in process `syz-executor.2'. 04:18:03 executing program 3: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) r1 = openat(r0, &(0x7f00000001c0)='./file0\x00', 0x20, 0x20) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000580)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000900)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x9044020}, 0xc, &(0x7f0000000500)={&(0x7f0000000680)=@migrate={0x264, 0x21, 0x3a1d9e210a470b54, 0x70bd26, 0x25dfdbfd, {{@in=@loopback, @in=@loopback, 0x4e24, 0xa0a1, 0x4e21, 0x3ad, 0x2, 0x0, 0x20, 0x73, 0x0, r3}, 0x6e6bb0, 0x1}, [@algo_comp={0x84, 0x3, {{'lzs\x00'}, 0x1d0, "203140afaf2953dc9382acf1d2540edcdb31b0450c3091f2448b3b39affe9f788c2e3f37c9e0ade101e68853c07742e2915f4b1e4b0c69aa97e3"}}, @etimer_thresh={0x8, 0xc, 0x8}, @lastused={0xc, 0xf, 0xffffffff}, @algo_comp={0x70, 0x3, {{'lzjh\x00'}, 0x138, "2a7b309e17eb43797b7038b1abf63458b345dafb24c78df5cb966f826678bfb1553f97098d649f"}}, @algo_comp={0xe4, 0x3, {{'lzjh\x00'}, 0x4e0, "033cc153a2cfe41c03f24a7d39cfbee46ba2b6b90e4e93f00a83d747abcd45641e4e23f1c5dfa46ec9d8b034c4cab8f528dfce2769e947586ee207f4324aa9947d2e6b44424bba11bcb57a9048963457bf02410f4a77e0c798a9d1b1886181ffd271e2354a06789affa283e2fe2f9ee369386d4a5440c7b7d1c858926268bf86a8960f16596005d3402a99dd7a3bb227a24b6fcc4860348be704e450"}}, @mark={0xc, 0x15, {0x35075d, 0x401}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x4e24, 0x4e21, @in6=@remote}}]}, 0x264}, 0x1, 0x0, 0x0, 0x1}, 0x480c4) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x2, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r4, 0xc008ae05, &(0x7f0000000400)=""/136) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x7}) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f0000000180)=0x2, 0x4) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:03 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair(0x1, 0x6, 0x80, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f00000003c0)={r2, 0x1f}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) fchdir(r0) r4 = socket(0x22, 0x2, 0x4) bind$isdn_base(r4, &(0x7f0000000040), 0x6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f0000000140)={{0x0, 0x0, @descriptor="89992ed591196039"}}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @multicast2}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) write$selinux_create(r3, &(0x7f0000000340)=@objname={'system_u:object_r:setrans_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x400, 0x20, './file0\x00'}, 0x69) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0xffffffffffffff84) mount$9p_xen(0x0, 0x0, &(0x7f0000000180)='9p\x80', 0x2, 0x0) 04:18:03 executing program 3: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) r1 = openat(r0, &(0x7f00000001c0)='./file0\x00', 0x20, 0x20) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000580)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000900)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x9044020}, 0xc, &(0x7f0000000500)={&(0x7f0000000680)=@migrate={0x264, 0x21, 0x3a1d9e210a470b54, 0x70bd26, 0x25dfdbfd, {{@in=@loopback, @in=@loopback, 0x4e24, 0xa0a1, 0x4e21, 0x3ad, 0x2, 0x0, 0x20, 0x73, 0x0, r3}, 0x6e6bb0, 0x1}, [@algo_comp={0x84, 0x3, {{'lzs\x00'}, 0x1d0, "203140afaf2953dc9382acf1d2540edcdb31b0450c3091f2448b3b39affe9f788c2e3f37c9e0ade101e68853c07742e2915f4b1e4b0c69aa97e3"}}, @etimer_thresh={0x8, 0xc, 0x8}, @lastused={0xc, 0xf, 0xffffffff}, @algo_comp={0x70, 0x3, {{'lzjh\x00'}, 0x138, "2a7b309e17eb43797b7038b1abf63458b345dafb24c78df5cb966f826678bfb1553f97098d649f"}}, @algo_comp={0xe4, 0x3, {{'lzjh\x00'}, 0x4e0, "033cc153a2cfe41c03f24a7d39cfbee46ba2b6b90e4e93f00a83d747abcd45641e4e23f1c5dfa46ec9d8b034c4cab8f528dfce2769e947586ee207f4324aa9947d2e6b44424bba11bcb57a9048963457bf02410f4a77e0c798a9d1b1886181ffd271e2354a06789affa283e2fe2f9ee369386d4a5440c7b7d1c858926268bf86a8960f16596005d3402a99dd7a3bb227a24b6fcc4860348be704e450"}}, @mark={0xc, 0x15, {0x35075d, 0x401}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x4e24, 0x4e21, @in6=@remote}}]}, 0x264}, 0x1, 0x0, 0x0, 0x1}, 0x480c4) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x2, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r4, 0xc008ae05, &(0x7f0000000400)=""/136) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x7}) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f0000000180)=0x2, 0x4) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:04 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'syzkaller1\x00', {0x2, 0x2, @loopback}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x1b) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000240)={0x100000000, 0x3}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='illinois\x00', 0xfffffffffffffea7) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:04 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r1 = open(0x0, 0x40c2, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$selinux_access(r2, &(0x7f00000004c0)={'system_u:object_r:dbusd_etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x688c}, 0x45) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="32b173324c28110d3f431dec63abc5a77c6b2463104cbb835beeda64a5cc314546da043c5e4876914234b883c86eca98bbd128a0ac62a09c0d99ba77fc0a60c96f6b1a41534f8ca288dc4ace8d5173"], 0x1) write(r1, &(0x7f0000000600)="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", 0x99c) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) write(r3, &(0x7f0000000600)="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", 0xcaa) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x4) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) mount(0x0, 0x0, 0x0, 0x100000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xaa92}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@dfltuid={'dfltuid'}}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid'}}, {@dfltuid={'dfltuid'}}, {@mmap='mmap'}, {@debug={'debug'}}, {@cache_mmap='cache=mmap'}, {@cache_fscache='cache=fscache'}, {@aname={'aname', 0x3d, '9p\x00'}}, {@dfltuid={'dfltuid'}}]}}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000900)={0xc, 0x0, &(0x7f0000000680)=[@free_buffer], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) 04:18:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r4 = socket(0x22, 0x2, 0x4) bind$isdn_base(r4, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r6 = dup(0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r7}}]}) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e21, 0x6, 0x4e24, 0x0, 0xa, 0x20, 0x10, 0x2c, r5, r7}, {0x0, 0xef, 0x537, 0x5e, 0x8, 0x3, 0x6, 0x10001}, {0x7ff, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4, 0x6e6bbc, 0x2, 0xce6deda4bade69d6, 0xa3db1544cf14ecb8, 0x1}, {{@in=@remote, 0x4d5, 0x32}, 0x180fcf2be46d7f8e, @in6=@empty, 0x0, 0x2, 0x2, 0x2, 0x7fffffff, 0x3, 0x1}}, 0xe8) r8 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r8, 0xae9a) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r8, 0xc034564b, &(0x7f0000000240)={0x52, 0x32344d59, 0x7cc, 0x9, 0x3, @discrete={0x0, 0x40}}) connect$bt_sco(r3, &(0x7f0000000100)={0x1f, {0x7f, 0x40, 0xbb, 0x2, 0x6, 0x9}}, 0x8) 04:18:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c6580f67ee26ddc4b7e69723d2e3a66696c65302c776f726b6469723d2e2f66696c6531"]) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@ipv4, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) r4 = dup(0xffffffffffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r5}}]}) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='\x02\x00', 0x1000000, &(0x7f0000000d40)={[{@mode={'mode', 0x3d, 0x8}}], [{@fowner_gt={'fowner>', r5}}, {@subj_user={'subj_user', 0x3d, '.vboxnet1}%'}}, {@uid_gt={'uid>', r3}}, {@fsname={'fsname', 0x3d, 'bpf\x00'}}, {@measure='measure'}, {@dont_hash='dont_hash'}]}) r6 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/mixer\x00', 0x44303, 0x0) getsockopt$inet6_int(r7, 0x29, 0x5b, &(0x7f0000000d00), &(0x7f0000000e00)=0x4) r8 = socket(0x22, 0x2, 0x4) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8050000c0010000c001000000000000c001000000000000600500006005000060050000600500006005000004000000", @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="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"/1513], 0x658) bind$isdn_base(r8, &(0x7f0000000040), 0x6) sendmsg$nl_route(r8, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40020}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@ipv4_getrule={0x20, 0x22, 0x400, 0x70bd28, 0x25dfdbfb, {0x2, 0x14, 0x0, 0x6, 0x6, 0x0, 0x0, 0x3, 0x2}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x8004}, 0x1) renameat2(r6, &(0x7f0000000040)='./file0\x00', r6, &(0x7f0000000100)='./file1\x00', 0x2) [ 297.495811] audit: type=1800 audit(1570076284.309:105): pid=12298 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17030 res=0 [ 297.569889] overlayfs: missing 'lowerdir' 04:18:04 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2c08}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x8, 0x4, 0x7}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:04 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r1 = open(0x0, 0x40c2, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$selinux_access(r2, &(0x7f00000004c0)={'system_u:object_r:dbusd_etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x688c}, 0x45) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="32b173324c28110d3f431dec63abc5a77c6b2463104cbb835beeda64a5cc314546da043c5e4876914234b883c86eca98bbd128a0ac62a09c0d99ba77fc0a60c96f6b1a41534f8ca288dc4ace8d5173"], 0x1) write(r1, &(0x7f0000000600)="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", 0x99c) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) write(r3, &(0x7f0000000600)="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", 0xcaa) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x4) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) mount(0x0, 0x0, 0x0, 0x100000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xaa92}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@dfltuid={'dfltuid'}}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid'}}, {@dfltuid={'dfltuid'}}, {@mmap='mmap'}, {@debug={'debug'}}, {@cache_mmap='cache=mmap'}, {@cache_fscache='cache=fscache'}, {@aname={'aname', 0x3d, '9p\x00'}}, {@dfltuid={'dfltuid'}}]}}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000900)={0xc, 0x0, &(0x7f0000000680)=[@free_buffer], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) [ 297.637467] audit: type=1804 audit(1570076284.339:106): pid=12298 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/207/file0" dev="sda1" ino=17030 res=1 [ 297.643478] ntfs: (device loop0): parse_options(): Unrecognized mount option . 04:18:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed5039478d61a9b484b597fc35036cf6e12bb0c2123c3e0c96a24d9feabd"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) [ 297.724473] ntfs: (device loop3): parse_options(): Unrecognized mount option . [ 297.869960] overlayfs: missing 'lowerdir' [ 297.911622] ntfs: (device loop3): parse_options(): Unrecognized mount option . 04:18:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0xfffc) [ 297.947260] audit: type=1800 audit(1570076284.609:107): pid=12321 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16577 res=0 04:18:04 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) r1 = shmget(0x2, 0x2000, 0x78000000, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000140)=""/73) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r4 = socket(0x22, 0x2, 0x4) bind$isdn_base(r4, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r6 = dup(0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r7}}]}) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e21, 0x6, 0x4e24, 0x0, 0xa, 0x20, 0x10, 0x2c, r5, r7}, {0x0, 0xef, 0x537, 0x5e, 0x8, 0x3, 0x6, 0x10001}, {0x7ff, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4, 0x6e6bbc, 0x2, 0xce6deda4bade69d6, 0xa3db1544cf14ecb8, 0x1}, {{@in=@remote, 0x4d5, 0x32}, 0x180fcf2be46d7f8e, @in6=@empty, 0x0, 0x2, 0x2, 0x2, 0x7fffffff, 0x3, 0x1}}, 0xe8) r8 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r8, 0xae9a) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r8, 0xc034564b, &(0x7f0000000240)={0x52, 0x32344d59, 0x7cc, 0x9, 0x3, @discrete={0x0, 0x40}}) connect$bt_sco(r3, &(0x7f0000000100)={0x1f, {0x7f, 0x40, 0xbb, 0x2, 0x6, 0x9}}, 0x8) [ 298.133915] audit: type=1804 audit(1570076284.609:108): pid=12318 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/208/file0" dev="sda1" ino=16577 res=1 04:18:05 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x4800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x11}, 0x0, 0x0, 0x0, 0xd9a54e209111cd9c}, 0x0, 0xfffffffffffffffc, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x88800) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r2 = socket(0x22, 0x2, 0x4) bind$isdn_base(r2, &(0x7f0000000040), 0x6) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000001c0)={0x6, [0x6, 0x7, 0x966, 0x62, 0xb1c, 0x100]}, &(0x7f0000000340)=0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:05 executing program 3: writev(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r0 = socket(0x22, 0x2, 0x4) bind$isdn_base(r0, &(0x7f0000000040), 0x6) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x18, r2, 0xf01, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x4, 0x6}]}, 0x18}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x84c02000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x7c, r2, 0x824, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_team\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x2, 0x101000) write$P9_RLOPEN(r3, &(0x7f00000002c0)={0x18, 0xd, 0x1, {{0x2, 0x4}, 0x1}}, 0x18) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) r5 = syz_open_pts(r4, 0x0) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1c0000, 0x0) pipe(&(0x7f00000012c0)={0xffffffffffffffff}) read$char_usb(r7, &(0x7f0000004640)=""/4096, 0xb2e5720f77506b66) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0xb4, 0xba, 0x4a, 0x4a, 0x0, 0x3, 0x4a00, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc6, 0x7, @perf_config_ext={0x0, 0x100000001}, 0x2, 0x0, 0x101, 0x6, 0x7, 0x6, 0xfffd}, r6, 0x8, r7, 0x1) write$binfmt_aout(r4, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000040)={0x17}) 04:18:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x883f22a432ca4ab0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000180)={0x94, @tick=0xf59, 0x4, {0x9, 0x7}, 0x4, 0x2}) r2 = socket(0x22, 0x2, 0x4) bind$isdn_base(r2, &(0x7f0000000040), 0x6) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/context\x00', 0x2, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000340)='memory.max\x00', 0x2, 0x0) ppoll(&(0x7f0000000380)=[{r2}, {r3}, {r4, 0x105}, {r0, 0x1082}, {r0}], 0x5, &(0x7f0000000500)={0x77359400}, &(0x7f0000000580)={0x8}, 0x8) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fcntl$setstatus(r5, 0x4, 0x4000) fchdir(r6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000400)="6c9b41a8a79d16ca5a981c8cf3ee7f3ff31c261744516e77c9666c60aa99209d41feff75ea37528cc6e7a97b695e4c24de878809a91dfec412872baa629fc59bc1094457676552956632f089e8b44941d3ce042850983f709215623024dfcd7c4fc134523976187bfd9568ba9a2d7d5ff6ae6fa6e5ff3dc8370d49411b329fced06f80b31e99b475e2c93d3d44baadee4e8c04c0c3fce9c47e52c24dba01c77ca3a3bcd776379b5ee8dbd21babf9de5597") umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, &(0x7f0000000240)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r6}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r6}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r7 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x9, 0x30}, 0xc) write$cgroup_pid(r7, &(0x7f0000000640), 0x12) 04:18:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0xfffc) 04:18:05 executing program 3: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) r1 = shmget(0x2, 0x2000, 0x78000000, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000140)=""/73) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r5 = dup(0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r6}}]}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e21, 0x6, 0x4e24, 0x0, 0xa, 0x20, 0x10, 0x2c, r4, r6}, {0x0, 0xef, 0x537, 0x5e, 0x8, 0x3, 0x6, 0x10001}, {0x7ff, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4, 0x6e6bbc, 0x2, 0xce6deda4bade69d6, 0xa3db1544cf14ecb8, 0x1}, {{@in=@remote, 0x4d5, 0x32}, 0x180fcf2be46d7f8e, @in6=@empty, 0x0, 0x2, 0x2, 0x2, 0x7fffffff, 0x3, 0x1}}, 0xe8) r7 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r7, 0xae9a) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r7, 0xc034564b, &(0x7f0000000240)={0x52, 0x32344d59, 0x7cc, 0x9, 0x3, @discrete={0x0, 0x40}}) 04:18:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, &(0x7f0000000240)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r6}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r6}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r7 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x9, 0x30}, 0xc) write$cgroup_pid(r7, &(0x7f0000000640), 0x12) 04:18:05 executing program 2: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2c08}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x8, 0x4, 0x7}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:05 executing program 3: socket$inet6(0xa, 0x3, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x0, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x0, 0x5, &(0x7f0000001000), 0x31e) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) r1 = socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) setsockopt$inet_tcp_int(r1, 0x6, 0x3, 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x129, &(0x7f0000000200)}, 0xfffffffffffffe13) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x8, 0x8}, 0xc) write$UHID_INPUT(r2, &(0x7f00000002c0)={0x8, "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", 0x1000}, 0x1006) socket$inet(0x2, 0x80003, 0x2) socket$inet6_sctp(0xa, 0x5, 0x84) 04:18:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r5 = dup(0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r6}}]}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e21, 0x6, 0x4e24, 0x0, 0xa, 0x20, 0x10, 0x2c, r4, r6}, {0x0, 0xef, 0x537, 0x5e, 0x8, 0x3, 0x6, 0x10001}, {0x7ff, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4, 0x6e6bbc, 0x2, 0xce6deda4bade69d6, 0xa3db1544cf14ecb8, 0x1}, {{@in=@remote, 0x4d5, 0x32}, 0x180fcf2be46d7f8e, @in6=@empty, 0x0, 0x2, 0x2, 0x2, 0x7fffffff, 0x3, 0x1}}, 0xe8) r7 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r7, 0xae9a) 04:18:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000002c0)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x492, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200040, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000240)=0x4) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r1, r0, r0}, &(0x7f0000000140)=""/112, 0x70, &(0x7f0000000580)={&(0x7f0000000500)={'sha3-384\x00'}}) 04:18:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, &(0x7f0000000240)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r6}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r6}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r7 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x9, 0x30}, 0xc) write$cgroup_pid(r7, &(0x7f0000000640), 0x12) 04:18:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0xfffc) 04:18:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000002c0)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x492, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200040, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000240)=0x4) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r1, r0, r0}, &(0x7f0000000140)=""/112, 0x70, &(0x7f0000000580)={&(0x7f0000000500)={'sha3-384\x00'}}) 04:18:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r5 = dup(0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r6}}]}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e21, 0x6, 0x4e24, 0x0, 0xa, 0x20, 0x10, 0x2c, r4, r6}, {0x0, 0xef, 0x537, 0x5e, 0x8, 0x3, 0x6, 0x10001}, {0x7ff, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4, 0x6e6bbc, 0x2, 0xce6deda4bade69d6, 0xa3db1544cf14ecb8, 0x1}, {{@in=@remote, 0x4d5, 0x32}, 0x180fcf2be46d7f8e, @in6=@empty, 0x0, 0x2, 0x2, 0x2, 0x7fffffff, 0x3, 0x1}}, 0xe8) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) 04:18:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0], &(0x7f0000000240)=0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) [ 299.790528] kauditd_printk_skb: 7 callbacks suppressed [ 299.790537] audit: type=1800 audit(1570076286.599:113): pid=12464 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16577 res=0 [ 299.848608] ntfs: (device loop0): parse_options(): Unrecognized mount option . 04:18:06 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="172d6284e8bb15c46c94b15918258498f373caa8e4517f8794e03972c55aa34d2b5250df54f5f1b0fbc017ea4286c2f9f360e8d629e6a607000000000000003ecbabbef75227704f0e983a41188f90e31a2c2323ee2ff52cdb0a329b9fe50da68d2b101e341bfbde67da3e2df04ea76b12bd11ed86ffe87733172c5347990939cfa5708a26bfb7279afa4f10f1b37bf2b00628b4b7dacff29fd0fa9039f13865ef691ce4fd26e8cee620cf06ade3832a1d6e9a0cb0417289aa44834b399b0415c6c8037b836221a3b584fca2b0fe021400c1b72151d88940bfeafc", @ANYRESHEX=r2, @ANYBLOB=',\x00']) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r5}, {0x8, 0x5, r5}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r6 = dup(0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) r8 = dup(0xffffffffffffffff) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r9}}]}) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@uid={'uid', 0x3d, r4}}], [{@dont_appraise='dont_appraise'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user'}}, {@uid_lt={'uid<', r9}}, {@measure='measure'}, {@measure='measure'}]}) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='fuseblk\x00', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x64}}, {@allow_other='allow_other'}], [{@uid_lt={'uid<', r7}}, {@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '(lo'}}]}}) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r10) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r5 = dup(0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r6}}]}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e21, 0x6, 0x4e24, 0x0, 0xa, 0x20, 0x10, 0x2c, r4, r6}, {0x0, 0xef, 0x537, 0x5e, 0x8, 0x3, 0x6, 0x10001}, {0x7ff, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4, 0x6e6bbc, 0x2, 0xce6deda4bade69d6, 0xa3db1544cf14ecb8, 0x1}, {{@in=@remote, 0x4d5, 0x32}, 0x180fcf2be46d7f8e, @in6=@empty, 0x0, 0x2, 0x2, 0x2, 0x7fffffff, 0x3, 0x1}}, 0xe8) r7 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r7, 0xae9a) [ 299.883646] audit: type=1804 audit(1570076286.609:114): pid=12464 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/211/file0" dev="sda1" ino=16577 res=1 04:18:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r5 = dup(0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r6}}]}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e21, 0x6, 0x4e24, 0x0, 0xa, 0x20, 0x10, 0x2c, r4, r6}, {0x0, 0xef, 0x537, 0x5e, 0x8, 0x3, 0x6, 0x10001}, {0x7ff, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4, 0x6e6bbc, 0x2, 0xce6deda4bade69d6, 0xa3db1544cf14ecb8, 0x1}, {{@in=@remote, 0x4d5, 0x32}, 0x180fcf2be46d7f8e, @in6=@empty, 0x0, 0x2, 0x2, 0x2, 0x7fffffff, 0x3, 0x1}}, 0xe8) [ 300.104518] ntfs: (device loop5): parse_options(): Unrecognized mount option -b„è»Äl”±Y%„˜ósʨäQ‡”à9rÅZ£M+RPßTõñ°ûÀêB†Âùó`èÖ)æ¦. [ 300.182092] ntfs: (device loop0): parse_options(): Unrecognized mount option . 04:18:07 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000140)={0x0, @reserved}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, &(0x7f0000000240)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r6}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r6}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r7 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x9, 0x30}, 0xc) write$cgroup_pid(r7, &(0x7f0000000640), 0x12) 04:18:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0xfffc) 04:18:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0], &(0x7f0000000240)=0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) [ 300.388693] audit: type=1800 audit(1570076287.199:115): pid=12510 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16898 res=0 04:18:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r5 = dup(0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r6}}]}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e21, 0x6, 0x4e24, 0x0, 0xa, 0x20, 0x10, 0x2c, r4, r6}, {0x0, 0xef, 0x537, 0x5e, 0x8, 0x3, 0x6, 0x10001}, {0x7ff, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4, 0x6e6bbc, 0x2, 0xce6deda4bade69d6, 0xa3db1544cf14ecb8, 0x1}, {{@in=@remote, 0x4d5, 0x32}, 0x180fcf2be46d7f8e, @in6=@empty, 0x0, 0x2, 0x2, 0x2, 0x7fffffff, 0x3, 0x1}}, 0xe8) r7 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r7, 0xae9a) 04:18:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vsock\x00', 0x400000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200000, 0x0) sendmmsg(r2, &(0x7f0000006a40)=[{{&(0x7f0000000140)=@un=@abs={0x0, 0x0, 0x4e24}, 0x80, &(0x7f0000000580)=[{&(0x7f00000001c0)="70186c0b1708db4f384e0ceafe114be925c05a0e63d416089e319ffa701f2905ed7907fffcbd8474ba0fe2f5facb67fb976ad69e4fe18f866c888e5b34f1fe5a4dbb86c59c3b40d8b415aefb556f80c518b3639fd05a9509a81671fe2ed0ac15e81f5fc47439e281cb35900877", 0x6d}, {&(0x7f0000000240)="f9160d03f941eed6377dc520a27039bbcd1ca5d357688b4ac68fc840f534dc84571648d7569134b47e1d4a731b", 0x2d}, {&(0x7f0000000280)="cde2e6a593afd98d7c80f998367e7a3932582e5028c67b935b6b1837f4357833049978e13ebd124a5cc9ffb3052cf05e5bb461059ade450e893524887eecb344e88146537f7f983f6d8b95aa20c176f3f69de6fb1162ad8882d7c213d63cf0b59d1aca93426ef1bd8df50aebbe49e4a70ba82e8b997a90641e12e9ec9102d4871e89983e1d250b7ba8afd85de5566ff393edcd26054c9d7a4e3505a6968321fc58f4a7839186e6e5c66185ce26a1a38554a3fde1ccda9c9ebfa9360a4206a3fc1d5a91acf0d4eedb11c3c23960eae56851b8b8eb745ca1db40f8f4921ce06439", 0xe0}, {&(0x7f00000003c0)="a6b2f0a54fb7332d1519135b574aa6dd65143e72dd7820ce4e16ae65162664abdbfd641936927ae8406136e78cc5faf89ed8be1fe6bc13167dcca490f1b92a78f8e8f8a11ec148cff5db8a5fb01485a269545021e3e537590c6e0ce111ffa2db4b2a0aa352513ea6cc02e16c9c7b871407d2c8a6fb4ec55f5a419d454664285d325fb67ad9c91af2c190f685cf4db4a3fb46f74b", 0x94}, {&(0x7f0000000500)="3187b8247f084229b544ab21ac26063d406e5978f336137a53640027b99c0ce18974f215ef45820cf842b7e27cb535629002891ffef5d4174f78964c4f904a08d1bd85000e149dc0ae14ea", 0x4b}, {&(0x7f0000000640)="edcc93341b8df0c9bc7769f58006dc8c0cb0be32588aefd3e158b7b5a9f9d15bea23eeee5d83dbfca4b531e387417711d8458f6206186ea812d16b7aa0541726f3271c23bd96737ec98a037b36926dc24c047816100e4bd0ab25be6dd8bb40eb1b4d1c8e267fd18a08c72d713ad7cfd89b8669726614452dcdb959fad2e09be873ae774f404a913928487931dc5ebe21709cb1c2b5e8c23a7f612da7b6ac55237c485d96d9bcd6789f927885f9da4ad644e251e6f708298968c595e2b85842a780c7fe37b4a883dabca32f4f22f130365c2bc5bf", 0xd4}], 0x6, &(0x7f0000000740)=[{0xa0, 0x29, 0xa4, "a9366809e5e3680709a4646aff8df876673f79d59b0f9fab92e7870add8654f4900769a819bccc4b488f7a0c48e7d6b82537ef140e5355b5861a8b82843ce50ea389c87d83c0ae7fbd0246742091f0ca85727e7f33f14b38c26a6e263e725e14b503aa9dc24b0fb238543cf3d6cf29315e29619390d95b37f350246e7f860f3dd900f6769c88641033ca7a97"}, {0x80, 0x96fc30382ae3e073, 0x1, "e062df27860cc99c8385c26c90d3ab1f6d3944be140941fc8efea660b79dd3237695f694519b58dd13f89d74883477000566d692123693c52a3b6aae90a2178b617e9af90b1e13d72d7156b93d0f0b2fea33da3c28dfdad36d4395ba827d97ee5959c543817403f8c8a1c7a938"}, {0x1010, 0x10e, 0x2, "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"}, {0x40, 0x110, 0xff, "2abb69a71f46ad85c89dc299a477f6294b5147f652dffb063bd4307dd4db6670b747498e9158f37756c38054d4d389"}, {0xc8, 0x105, 0x1f439661, "6ef05cf4396b309eb87020029b4f08d2342ac2cbf07a2b89f9495dd0b1b5b4e6edd8865625120a902c3a1b3480bf4910f563d63ad4d245d128d017c23c277436d1ddaadee83bf1bb1c2540edbc16af87396b975532eaa86f2dcaa3c57bac771704e15f52a88d059285162b0531a4d18826b9b6887282e4c271d7f3fe6e38b863c724e412175cedcaa982c4673899ad8556bcb1a546df71e430076b69089e04b60c420b94c215ab8a4513570c2365dd4dfaa96ae4ff"}, {0xf0, 0x118, 0x638f, "8b7f80139f00fcf3605dca105b1575d8256754313dd26ab9afedc24ce039594fa5e3edd0da06276a5db682600b20a06fa0137bfcfadc4e67a77c207f166e3814dbad0469d7cab661b1deadcf7f5e50ee0b3d632ebb7aa5aa8c7d9595784a5966422fa2fa77a219abee652c930cd586619503c896f87078fbc74a4d49b9c1727eb52405b20b38c6751559665ddbd00d6877118b20f8c13d53eb0514e6c7105126eb185f12ea371050c9f113886bc0954557737aa5d1a1c6b753915b1f1742ba6c11997b4d2e4e27ea6ae042101f8938454dc9eb6f14b374457f027b"}, {0xb0, 0x117, 0x800, "c89a4e09949bd721eeb769a86633567d49c3b2a555cbb81ea34b8b3792de225358d0a91ba44ce4306c4648eff12514151c303f10990f9cef8a9b40ff97d8cbba60171f9a17bce36e02cd1b9b41e313146d454f47febc2dc26f8235b7dd72b3f16ad9936489c7aa5af1ed6a1cd6d959c542b282af15c6af890b57b25ca9db4043426d26210d8ba295abae398182f57dddeddb6b3a07fa7d8dceaa2495218a6fc6"}], 0x13d8}}, {{&(0x7f0000001b40)=@ethernet={0x6}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000001bc0)="caaf004f910ed44d37c447d4a7b0449118c4d8a3f4d849118adc42a116a1595b4807c2057ed70061f216ba576204a6dfedd647769da15183ee7d8e3f566ba41d45106312de1614eeca6720803e84079454a1305b2f89b49141b0134c34d4feaaec851b7412660d76fb2aca7cbdfb2d7c5e5cafee943bcb0f824191252f4da969d121c291880de2", 0x87}, {&(0x7f0000001c80)="48c834129974e97b4db5dec46755c042366a0c252f9e4434c2fe1bd5a659c778301779a5e0543a2037d2229c42a72712c1c52382e5f23c028f33652ce9527a85e6706d7ebbd7d54d259f7d920a2a3c88af73ace49a7c46faf2302f720246e4f23b8f9c0a5c881ce83ba35dcb45279aec2de126208ffdd8d76eb79b9a358e0c3e12a247175f463e2c61dffc618d339d26d08437d66bbe36c35055398951936bf11e71431018fc75f3f5283212e3d6e754abbe20f8fd1657e89d91c4e75b12f56c32b2450977dde3bb26bc783bf1e4fc33df320b5f7cc8d2a88d36701551c5e3679c2bac46be35ba3c4f0d889ad2ce0b40823ef762cdcf", 0xf6}, {&(0x7f0000001d80)="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", 0x1000}, {&(0x7f0000000480)="7d9ef680fd4c70c3b4c1b4121c6b74592f89242a50c087cbe9ce27dc2c44d9d22e9bd654f6b9ec82a08eac61abbc027c305e44d10a2cf47469ea", 0x3a}, {&(0x7f0000002d80)="b9bbaa7e210ed56990f921c406db1296b67d4eec5b47c91c2695ebff7d67fd8ba2134c6182870e2e45ea88ea5335", 0x2e}, {&(0x7f0000002dc0)="a22b0e50872b563d1a583bb2d23f3d7a6114b31beef546c9c97ca20a2d6149ceee9ee5327fc8c9a286547488c72a92df9a65ee0114f18829ae7aeac3b5cbdcfb172f68ac3a53dab09fe8f0fdcf50928a77b85f4c3c5c5a13309c891041a160d9b6bb9f0356a7ba7298a57202a8b0a8dd7748aba254a83aa5384099d2020416aac7ea41ea8e35de491a4daf33675ab711f0c0acb51c4c9a30a0b7eab01d84d78556c54a7772b29c196ae5ab2c0dbfb74099bd13384642547ec850bcfe96ac802eea5504cfb1d12136c2129ea5c95a", 0xce}, {&(0x7f0000002ec0)="3722fa26b0b2607ae7148bd2eaff4e980365541c08d47d00134dda29d78e88e14c675fa4dae007001f9a991196bcefd46144dcd30c8e0a7954745bcff54d03cf37edf40da9e261ffb2bddc17e7615b6cc26cc43216c35337a14920601fcf040982110b14cc175b63fd2fac2ebf5a62dcab55d2ae092c6d94a2035e8126c3eaf394318cc229281f9e9be20541c48e928c1bd78e4e3e52bd446f4bb4509bb6c91bd7d0da8e708bf892792ceeb00af3435b284b28ab0c5a586f92547a275cfbad3c05de6be31c67ecfeae2ee78b3291f425d0f6c6b21f745387c36794747e9b070e3b303073b6a0b893eb259c584e196c1e452e20b14c", 0xf5}], 0x7, &(0x7f0000003040)=[{0x1010, 0x88, 0x8, "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"}, {0x88, 0x84, 0x401, "1c22ca51299e6e124e60e5bcd60c2f8ee69ea1f7e488aa227d9d6c69e5da031209af9a00cefff6f0d9a4707694387a6890e7319930906f06956015a9b5c5edb69e8e90616d51527c5d1ff5fb5dfedb72557243bec2eef478730cd586a99b57069eba4ee1e98a56f9e460287848ae2f4cedab9b1585"}, {0x1010, 0x10a, 0x0, "b73ac407433d3813fd29de359591f39d06c94f8c89fd0c180f6a7ae27962e448268b293535dee0a33055dc6d184d99ea93ee987556cb3b5fea5d4b86e52cad7fbb39d527e3b7c2e40a4c16eaaf035c96f3b3573d2e761b122dac972b1437f687815fa5c4cbf8d79c3e0fb7e215ced93b9a89b6ae8ebd47e33a3dd8a14aedb7e687c54d12c1cd74555449199d199afd6d2053b96774063eca85555df0552bb92b1134be38ad483cd3e18d020d3ba03624567cfb6a866031c294817fecbe10ab67c835c11c11adf455103d8bd4c34f119f84666eb024fc42202aa75099f3a97ff8f4093a6bd538ae2603968fead347cf231636be3fbe6681e70635669f78080361190437433651b50daeb3bf384fe19ab514c0be9f96251742b0a7fa9c4271e70753afd91c430d399906ff32afc301ff184c1779837d20c28893c0e857dd41bdfaf0bb67cea5f37e5df35a0899a9b1e49872c7eed08550a5d4dd89cb10f68333e8d0870678ffda6f03e75ebd8baf9c0c9e9cd6bdcb95a85ea423484b2fa1aac22e9f078ec674bda9c801ea41b0aa1522cef122f119e543f9e97f4cac3d493ecc6504cbf1431422549e0574a080552fa49fca22fc58c1b8d9b8bb820c93ca25812f7744eaf19d53c39ae0fc7731783716ab1983bb2e93c4400dacbf84411e008186bba631c0d9c26b546e8a8d0d7000d90edf93ab324f5de2d0a4a003f9d0ad4ae12dc5d1be0dbe5d71c1aaa5dc34b0826cf10035d074c7c1bba30ec968ed15ce5053a351200de77894a0cf9df6f9404d595cc5f397df3201b10c13d4b8595f5905b707655b6d0876bb6df4e8609f8c710ae79b577c53869bf7e5f629db62378d9cd236ce310dbd63a2fdbcbe60a1e9213ab120148f750cf37e6d614136ed94e43229c50bf2a9764b8ff9ffb6647c3b95561c387de491b01d94264c7127dc5895dd08c749d4d0a827043696365b40a5d4bf195c0920b92f35824b9da0b5b84bb626ff70e6c851985518c773652161a4601bb82ef379afe537fdd7b89dc21f2f1e9d7067967cfc08199556c65d9ddc1b6ea2da740ea6c6188df0aacb7be338292cea439dcb587a8c31c35da7ae3e9a07d2a15e2830571f3e81f2f2419764eddf184aa1b31c477e681cd2f92ee28cb8ffb452b7c153751d4f07a23cf16991a0793942639730c9cf8d5905489cfea8002882703c764624c2eef07df0d3946069a3ee8a0e1fdf8ecd099449aba52e79bcfceca25d90d664572500144af85800d289f074ea8a3c589cafa5fa7da0110538edac3149a24989126cfedf4fe25794a63a358511830622d8100d11ef2ee61bd8c1f008a5f697cf24757c058d01a62cdf748ea4461fd509fa28321ce108285051c4e952fcbc3b7c70af3d786013a307cb24d2ff2346f5673759ad38e8196948d742fe10bf62807cbff5f199e10203a7dba881726ecbb723c91bb692654b4cd012ddc9f60d40f68d115444ed46693a78631b364ae5491aceabe2d862ee6a73109b038a31cd5ce1b00bbf75c9917d70018d3a856ff9e9812d3788a4762dcafed992798818d50ec98027b15efda54b96ce564a0ab0360d3553e31f60b12896b0c811eb0fdf8a44ef53558fc43757740d1c8e8a4d4045aeb1e44ccfbaa1e4e7ee514120e24d3add221b8a9d61b20e52596a6492f26438affdb69289276cd43843f62017441d21690059a87308f30719094852665dc23f7328a48d88187ac14c62481600ae3fc45bae4b15eea7a07e233f16e435f6131808aee5f2bc3f377817781f42617aef37a12b861854edd3855a4045a06d2006d709365024e7fa282f185e444db0689acf77eb7153fe9e012f0600041bc803c866f3084726666c0c61ab8b9b1dc337ee78d8c2c9b3e2dfb01a8c2c9240baa0fa9864d9ddb82554cc8fef1b4c1dfbdc60e408904845c4794f41a8ad3703be64cbb6a067440c5875bba5548930d628eb68d866655492651152f3c0fa9ea72936b092a78b6ebc7261be653901c51b42dd05029823ce335472f6924d788ecb7a6246e46ba6f2a9e3a2a94e0cfa5992e7022fda7ed4bfa5820718406899ac990ea1533c00f7ce633cbcb4983692c5453e08ba5316d880ca8d9d6272194c34d1077598ca01b34afabbe824418f287703916740b66191c151f19c8f19cfab1e5977e68c733dc304972566dd016b7519079075c5fd6ed85bc6a1ec882ad6453db8db54afb9a481e699861b7f0a575652c8051bff84a27079f763decd1f04b257bfefc25b356d40f922601ac8ca84d403d53ecb605c18e098d3aabe36ce9397f7f59e6e4a2b9b2b5964fc57de9a8e78bf14ccb5710bad2e78985046bc25dfccec4c0c73d1b1f33410366bc7ffbc66d096a2315b040d7458972d323cf33bd63b8fffa1b2d6ef84c65b56d8ca9fc091260a0853933754aeebcda307e148f4e5db50a49d97383d10d2b7df053430aef030aa98a9ee2c972c544c5d27731428a6522050927f4d6904fa2450842f814a616b8d54b454af75ed1d3de85b6df6769af98d09f6f59fefb417234b795e70c75dc6cc359e9508f573976c78a0186df60ab4c77f6453b538261365e4df1cadd48c1e5c3d671b180a68ef97d4402799a2496e3a88be19330733886236379b57e49724f5b83adefafc60f4584e10339f220bca7571f545a26993690580ced3ee4e2cd7e4a75e393ec2170d7f5802fe86e59b92948718951c6514f554de055ca767b17ae9b083fbecaa74bce8f2161ce28be8f91050432cf468e65211bc81fecce35722588bdc0196df7fcc0b20d0280c486dc92ac96c1e49d8bcf2f72519c3869c7e15b1799005709fa264651cf05727f0a88fd7d4ce5981d3229a11bfbfe5d94d2a6c6e632d9881e68cd32e78c27bc1cec3f03608b7fa391b1cdfc6208b05bc0371f48c740c26d01ec374bca652929ed8600960dbd7f1d108ec41faa83454b0a388cff906881fa7cb10a6def381418ec720c1f063b200e61abdb3ea52bd656828cbc171cbefffcf9499f5da54d2c6b52790b67e6d9fc65138bf658c7eb4ed350b9824d106e7bb431142ef30a76c56fdc4946990bffb0df3e244fea605738108de3bed5a9aa2171abed58eecb8bdd27cac1a093ad973de305aeb6edf480ddee76660ecce4f1ba3890d487f26bb7bb7cd5f7a4e18f6fa272d320ad9300877afc29ac12ddef67ede2af606348b486bd5e965696a62beec62b764d4b39bd1e4f0148ec13e310930d267f52bbac743fbb321af88ba6b0f15048705ade8290642623c53f5cef88a9bee4fe706e983cd01d3faa1dfc198290c4563e0f17b53c2db83418f080ba209c90389fd5d399f221c487c57f6a91f8c86d589abc535f66322028cef32ae16a5b86276d337fb9b45c0b4dc022258cb68c18eee84acbd4054b2428e12ed5cec1c02a7bbc5d02cdd2c9622e33fbf5fa3365a9cf46925a7d30fc31a2a8ae3f0a7f8da14185bd2dbd2e72c0d24524c767519b3d61f4d4738c4245315b614d00fc174b86dda914f43bcef7cad01f230d65ec495be0d1d774efff48f6906f9375ef5763038ea453f89313206fd945d2c55b5f68b9a433feb5a1391a4133d9ae0531ae5b9d90c2b20bca6b1eec67cfd87d28f7435253b4d483c764942c79679d2e1454811abe306d2b908fa2e4faba91c1f9765a8e5c70bdafe0f9d91887078b7913b292f7de40645569844190374e91ee0e071634bd6ac986ef85f08f696a7c3640d4d2407bc167ef3adb9dee4d14fdf69b7cda0f17d92b3fe1b264b7cb74df7afccd78e91acb2f8696493e6501bee1c4d37c30ed3b0a806cad4118047c66c0fb9662c5601670410039b555051e14b4bd4545af8c12ed50ebc2d904d9535ef13be416418836ab943228c97ea083c47ca4e7c613b09a69af6dbc171dcb1b9991601dc457fd8cf4f0ca7f56c4a8c2e9b63c81ef184231a2e43e68fa5b40edbd04b87ef570ea55919cdd812d06321bf58a31a2d8dc4e933f799ff04b490d52cdcea5521aa18bf3284cd6ef8f1010f2610c7ebd83f6f3edeeedf03c180a9f1e96cd7fa151643d3dbce4066467b727aeddae2194f288be6e1b8bae0287c342e91352850e91044ca40026660b2f3122aa61f612f742251ab0d69fea8faf01c1a37c61dd8f352bcefd9847b36cc1dfa451e960f90d8d91cf2729e2e4c2b3f1727df24fabe5701c697d10de1a6edf15afd9ebc152e45ed01dfad2d390766be57dd4114f962790cbc6f9466d1aa02ed442a975847df2603f20707177783763eda781a2aa3b66b7f09f7ce76c6d3075894c0f079f9ba3737e17342f5f7e0b6b8867516128b0bc0f8069c7fed0916cebcb2d8602846c0a0a32e2ef3a15191fc66e51a358f67658fe5fb9f7a823b55ef816191c75db34819b76925dca9d2cd62875b07095e6fbd6208775a841d771135c77d3e4f16c18cf1a1b18712c72953f7eb8eb015cd2efdff08019811027460911643b02b1907b8c51f357f18893fdca9f4baa8a37900a77785ce34b2df2307a3293fc7c454e5b53d9c3784fbb4828ad35da66bbdd5274bb9085601f8b7f4c69045438b11fe04da2fba4c9d436a7bd905f6e8f1a56121227b6af4bef52c21e7c145a3282c217db03019fe3a014764edd14d6afb788f0714b7b5959fba0080db175c8ff5673678db797a52b99fd5419be588a05a2cff325fe68e38497853f89235070a68c062e6e065b9ba35728daa37a61b51e8c874e68824b92698e736c3de29e76e2261ffdee4c7caefa13a715dfdc7cc321a2add5e908d99903875e851c739ac1489a26d268dafe72b9288c70307b6ead5590e9a9db1e4ff470ba0dfa03c245b0c4e08b8e85b8bc4f2348faa02791422eb708d156e2963ddde6803e6f738ceaa04e1b96b64d9e6e7c4ac2292e2e4874c1b28349b4ffbcc816f13523b1bc90546d79346a0ef777345ee37b9b3981d43c573d5c03a4eeeea73848d9faaca2ecc18208e1106909645cd160228f3d41bd7de5fdbef4af97003ec09d8be7d7e300bcb938892871fe0eed4a7073de84cab1b2e846f1961f5cfdc401124c7807c2e8d40853f17422e784ce86de676b25a5f518de44b7cbac460ed21284e9b4338ac25ea45e84010530c8b17c12eaf5fba391d0360884c04b64963d0c1be17014465565b8c2394239796c76f0cd22d6cc80780c0222a9b2e78e786b583aa8092ded1c369c33681545a3e54122e3aacf2719da2097541dd701e784086636db7cb00f1fa76b3b2cd405d88e1cc03ba11d5b359c029b20e3f2929c7e15e4148ca9aa418ab048a6b3ff627409c7d0882db7b8f13b594f7ec61749dee7f74ddff3a2d132a3386759eeec8f2130d20f39d16df86742387c0c40712ad081b1402c8e14bfa774516a6232fd4ff360c3b71048d4108518db137505ebad3d9e844d5a0bf32aeddf05eb9956d1e3c248928dd558e435a822475312ba13964aae341a7621297991ca4f4b6106df96bf47aeb5c2a96003109fa8fe6be7848250bc220b77b2e303ad296acf8c7bfc4df2fc4b6896194589d29eef6b6b923c6837e2400b8842526fffd0e8a28e28d820fdda040ebf6382aca84ed14518bab67dd7ff87baa167170d09a85102bd641bc55e5422f289ede15c8c8bd2c91dd902cd1eb21710478a3629ded06d4b2557c66b6d9ae0df0ca10cda25b02805e9905dca70b3fe489a9627cb7b36ec1e2ffa54acf29b272a96daa3ca6284c1ef603b45df255f1ec88f6830d17541e27697a306ceb94efe0c1255bc42f81c4603fdabf7ed0cbb87c4fc340a80b0e9865457df04e31461ed67c8e53"}, {0x1010, 0x11, 0xfff, "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"}, {0x80, 0x3a, 0x1ff, "80a71a86cee488954ac9abd8ad77765bf7d8f65234ce05255e4421a217a6b0934678344ceda67cfe55bc8f8293fa4e71b012bb5e06ad8e7e08d4b1d8c80d779303e7e28aa2fe9a89e072f3c58fab26d3bda3b01da3b512d766e98cfec37c6bfcd6ee4d9f8db5f66e1882eb"}, {0xc0, 0x220, 0x400, "2288fdffb367453c6c0ad7be7e370efd9bfd602a7f11c52d20812f14d500f37717b14e5adbb8df1b48b3c03fdb7db75e6a3263a1e5e11c2c3596fbab6d9a3c8d260acd2b1e00705712954893292d00dc5eb6bbf15f2bd17e4e4d37f9e768d60579dca53de4ef1b275d1beb5d277640ad5d17932553f29536ee2116217b38dfa81a75573ff707b928c84daa7eb22c3441c8fa56f0fb549ae65d6fb94fc55c958aa5b80f29fde205d31becf0800eb4"}, {0xa0, 0x1, 0x5, "4b628824fe15751c5ea5e05cce9e3139b149567b12ccb4cd3555b07f71c04a3f5c373f398453bc33af5d8785a552291f03995796af0fcd6dfea7c526de6a6dd0ee15f46f335a3556d3e2681142b54669a70f86e7795e4abde933ce2417a3da8b44363f20336e45406cbf777c53c2d4eb2a54c2ee3583d649e931b731eb2aad19e60c3c25be4f98b290704691d02b4728"}, {0xf0, 0x110, 0x7, "dc19036b140dcf8343e89f8a024865d1fe5cdaa5a746abc4e4bfb41a5ed5d11d95a1c7141270fd844869375966424ace8f06916bea3805bfed89c93c844855fe840203206c7b6b0d1dbb75db134465502b428dbfb9b45c6be5136b496a821b9502dc6fce8e911a50dca9c30260e723a6823ac6670449fcf09bb489e327acec19a6f7c8a680d7648de75ee8d1751f4edc6f374e5648df8926e218e7fcc9182a8854dab973574e7e47baf9ae56bf60b477dc121385e66c25aaa576022ea8a607e69dc718f044c4727cc05eb086d5ddc0d01558c7163e646cb62a04afde95"}, {0x68, 0x1, 0x1, "14e1c1b1b1efd320d87f57bea0211b3168f8b5fd790363bb3f951e2296c7a2ac915619c56b448e30dfdd908048a88118a641c120ae889e46c5fc7d6d9fd2c7c7dbd9babfa89276872078715aa62f5a24bec4"}], 0x33f0}}, {{&(0x7f0000006440)=@rc={0x1f, {0x4, 0x1, 0xf9, 0x4, 0x4, 0x9}, 0x7}, 0x80, &(0x7f0000006740)=[{&(0x7f00000064c0)="418a6e5f3e07029464cc7c414ee35ec1d2e7cb8bf5ecad05ae031f04b0beffb6", 0x20}, {&(0x7f0000006500)="5b9ef26b131116ec698b422143599efe81cf49250f0b9a8a1c133d19a4cd6a8be83da54f4376a8757d876fd0", 0x2c}, {&(0x7f0000006540)="bcbf47733a6ec8c9aea1d75195157c24bc5c1532ceaecfa38c774a074be8426c664a29f50ec8f7d32b64540b327150871811559b9babf0ae586c114476859515e64927d844a9aa90d07e1fee7be5fe5dc22c", 0x52}, {&(0x7f00000065c0)="26d72c0f32d0d6462451d8d468ff6eb13279cf780f282ec2ff03f4335ad3ecb757c6753066eff45ebd424f40418bfd1c8a", 0x31}, {&(0x7f0000006600)="96f17ba83e51639c07bf166760e3837380a24840bc3f3fa02fd6c089887a11f090aeab882f3c2c0e18814702549d40d1ebbf1d43f87c1c3015a5eacce7", 0x3d}, {&(0x7f0000006640)="da172000f4629afbdefcf370f56fe55d8646fa8c8fbd5d411794a3b2589ddb5371b1e140a5455cbe6bfd3a5743ca81759e61798d45e65b2a449d9a113456e1f1dfffa205d31621204b5161c417188bcb0e89faf8184f438bc1a611226a635986b3233620f2df0b12e6228d82f627dfa4a084a2e8a2a89edd60f1dec17ec4d8aa22843ccdcb5f4f893d98a51ffea358e690dfd36557f712e2a89896bbd69cd95ab8d9d7bde4ec69c8192d72ea729129564dede9fed757ca0a71bf3fa3e15c7653c57fec05ce51625714ecdd11fd4c7ac12c6a115327961003be23f17e6016e0fc76e45e87d6da61", 0xe7}], 0x6, &(0x7f00000067c0)=[{0xd0, 0x82ae73402eeef42d, 0x7, "bc75b69999ed4416bdef598a05e33f76eabc03dd6dc5a6a114c179509e407866bc402b3920b1341957d41556bba7fb04a50bd93763a31db4c1e11d1c04046a4849d036ea0feef88ab3f82d105b9acfcf55ba684c9f2f7501d32240c35e64d8bae1ad1537ff67721a37907bcc88b1c5ee7c9f29b41125348150c212f645797a90de8de130479d8e90b2fcb8dd9d46b50d33871b06412137263956319254767f1d1c0fd0b1d314e7c751f9bde274e9e17bb46ef7da67458a7a2951a5bf24bfff"}, {0xc0, 0x103, 0x1, "59205a4e5f70dc600c5aeb9490b5e2650af6729ae438ab7fec3087bc8d1df8e01ae5f75284583c75ce5417568d2513cc4d2b82d8aeafcad5d684b5caaf1950a563e0de8e5af31748a351f1b4b94623de4de8c3258fb62b4700faf78eb6deaab2f4f8dd92db03c40041a18194b78cd8765d9777e73ba5d4e299c0ec1e2fa5518fc9a53341975761527ded638b385b9fb84a545417ec006b60521986838ee8ad3a60c353c672b6c0aa08a7"}, {0x40, 0x0, 0x8001, "9333cd666ac20fd5c173f436eabfd74f4a8a1c878b671006515d316be32d11377824b517767818181955d498288ca13e"}, {0x98, 0x6, 0x1, "b8db8c392407751509fdd2a8e401dc75dbe0179f0a6339d67f923262c2ea5c114c41c202ed3dd1cd3eced9b06c3bd866a2d7c1d2e96e7644250c2f2a1474add7b4803cee646600d50b8a2bb430e8deeca40a0f6f4177c8f847c1f647f305673d8e62b835586565d68847324e2b0d0ca2cb52b71588e6cb182512f74309770b14c448"}], 0x268}}], 0x3, 0x80800) clock_gettime(0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) 04:18:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r4 = dup(0xffffffffffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r5}}]}) [ 300.561184] audit: type=1804 audit(1570076287.199:116): pid=12510 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/212/file0" dev="sda1" ino=16898 res=1 04:18:07 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000080)=""/240) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000400)={{0x8, 0x20}, 'port0\x00', 0x11, 0x10048, 0x8, 0x1, 0xff, 0x0, 0x9, 0x0, 0x2, 0x3}) getresuid(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r4 = syz_open_dev$char_usb(0xc, 0xb4, 0x3) ioctl$int_in(r4, 0x5452, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x252, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) r5 = socket(0x22, 0x2, 0x4) bind$isdn_base(r5, &(0x7f0000000040), 0x6) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r4, r5, 0x0, 0xfffc) [ 300.890605] ntfs: (device loop0): parse_options(): Unrecognized mount option . 04:18:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0], &(0x7f0000000240)=0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:07 executing program 3: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket$isdn(0x22, 0x3, 0x3) sendto(r2, &(0x7f00000001c0)="dc0e2e2c8d14921d541d132e09cb9771831e84f0f3dd78f9a13309a78535990a7f151b093361b9cb3bb383cb9fc4c3e48d774b3b59dcb43870e26e4e549f6099e70564040f2d0b6aa07bb5c3312a262e3253f8a614d3ba555aa87e97456a1e1c20c315bfa239af93f7cf367458d70f6005ffe9c36d6abb1857dfeef93e27173af4f77c0e32904c9d61b8a3d35edb3d5015a6dd818d9d11630a60c2f668d73582a33c0381b0c05de8b118a635c5723174dbc3030e7316983ded", 0xb9, 0x40040, &(0x7f0000000100)=@l2={0x1f, 0xc39, {0x1, 0x3, 0x9, 0xac, 0x73}, 0x8000, 0x9}, 0x80) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1300000036ffff0180"], 0x9) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap='cache=mmap'}]}}) [ 300.948272] FAT-fs (loop5): bogus number of reserved sectors [ 300.974721] FAT-fs (loop5): Can't find a valid FAT filesystem [ 301.017186] audit: type=1800 audit(1570076287.829:117): pid=12547 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17017 res=0 [ 301.091591] FAT-fs (loop5): bogus number of reserved sectors 04:18:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r5 = dup(0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r6}}]}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e21, 0x6, 0x4e24, 0x0, 0xa, 0x20, 0x10, 0x2c, r4, r6}, {0x0, 0xef, 0x537, 0x5e, 0x8, 0x3, 0x6, 0x10001}, {0x7ff, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4, 0x6e6bbc, 0x2, 0xce6deda4bade69d6, 0xa3db1544cf14ecb8, 0x1}, {{@in=@remote, 0x4d5, 0x32}, 0x180fcf2be46d7f8e, @in6=@empty, 0x0, 0x2, 0x2, 0x2, 0x7fffffff, 0x3, 0x1}}, 0xe8) r7 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r7, 0xae9a) [ 301.139944] FAT-fs (loop5): Can't find a valid FAT filesystem 04:18:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0xf4ad, 0x0, 0x6, 0xff00, 0x9}, 0xc) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) ioctl$VIDIOC_DBG_S_REGISTER(r4, 0x4038564f, &(0x7f0000000080)={{0x3, @name="4ad265268be4385409c3c9dda3d03f6d1265c1c03a0b06947e82e266b605a889"}, 0x8, 0x920, 0x1}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x296, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 301.182999] audit: type=1804 audit(1570076287.829:118): pid=12547 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/213/file0" dev="sda1" ino=17017 res=1 04:18:08 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r1, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000080)=""/240) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r4 = dup(0xffffffffffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) 04:18:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) sendfile(r4, r5, 0x0, 0xfffc) 04:18:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r5 = dup(0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r6}}]}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e21, 0x6, 0x4e24, 0x0, 0xa, 0x20, 0x10, 0x2c, r4, r6}, {0x0, 0xef, 0x537, 0x5e, 0x8, 0x3, 0x6, 0x10001}, {0x7ff, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4, 0x6e6bbc, 0x2, 0xce6deda4bade69d6, 0xa3db1544cf14ecb8, 0x1}, {{@in=@remote, 0x4d5, 0x32}, 0x180fcf2be46d7f8e, @in6=@empty, 0x0, 0x2, 0x2, 0x2, 0x7fffffff, 0x3, 0x1}}, 0xe8) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) 04:18:08 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) dup(0xffffffffffffffff) 04:18:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r5 = dup(0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r6}}]}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e21, 0x6, 0x4e24, 0x0, 0xa, 0x20, 0x10, 0x2c, r4, r6}, {0x0, 0xef, 0x537, 0x5e, 0x8, 0x3, 0x6, 0x10001}, {0x7ff, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4, 0x6e6bbc, 0x2, 0xce6deda4bade69d6, 0xa3db1544cf14ecb8, 0x1}, {{@in=@remote, 0x4d5, 0x32}, 0x180fcf2be46d7f8e, @in6=@empty, 0x0, 0x2, 0x2, 0x2, 0x7fffffff, 0x3, 0x1}}, 0xe8) 04:18:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r4, r5, 0x0, 0xfffc) 04:18:08 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x4, 0x4001) getsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r5 = dup(0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r6}}]}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x4e21, 0x6, 0x4e24, 0x0, 0xa, 0x20, 0x10, 0x2c, r4, r6}, {0x0, 0xef, 0x537, 0x5e, 0x8, 0x3, 0x6, 0x10001}, {0x7ff, 0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4, 0x6e6bbc, 0x2, 0xce6deda4bade69d6, 0xa3db1544cf14ecb8, 0x1}, {{@in=@remote, 0x4d5, 0x32}, 0x180fcf2be46d7f8e, @in6=@empty, 0x0, 0x2, 0x2, 0x2, 0x7fffffff, 0x3, 0x1}}, 0xe8) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) 04:18:09 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = dup(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000140)={0x7, 0x8006, 0xfffffffb}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x1180, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000180)={0x1c, 0xa, 0x6}) 04:18:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) 04:18:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r4 = dup(0xffffffffffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r5}}]}) 04:18:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0xfffc) 04:18:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:09 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x6, 0x400000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000001c0)={0x0, 0x32, "bdaaf6e9a347f979176f218260de643ecb6fdd030e5df27ce9cb4b0595fda3f90cff142e3e2c20677552fd28959bcbc635de"}, &(0x7f0000000340)=0x3a) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000380)={r2, 0x6}, &(0x7f0000000400)=0x8) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x20100, 0x0) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0xfffc) 04:18:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) 04:18:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) r4 = dup(0xffffffffffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) 04:18:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0xfffc) 04:18:09 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="05000000", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x4, 0x1, 0x1ff, r4}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f00000005c0)={r4, 0x4, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r4, 0xe8a}, 0x8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000180)='./file0/../file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r6}}]}) setreuid(r6, 0xee01) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde251"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) socket(0x22, 0x2, 0x4) 04:18:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) write(r4, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xfffc) 04:18:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) 04:18:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) dup(0xffffffffffffffff) 04:18:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) write(r4, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xfffc) 04:18:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde251"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) 04:18:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) write(r4, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xfffc) 04:18:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x100800) 04:18:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) socket(0x22, 0x2, 0x4) 04:18:10 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffc3b) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32]) r0 = socket$netlink(0x10, 0x3, 0x0) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(0xffffffffffffffff) setns(r1, 0x20000) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) accept4$unix(r2, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = msgget$private(0x0, 0x200) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000002c0)=""/206) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) 04:18:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0xfffc) 04:18:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) 04:18:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde251"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) 04:18:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) socket(0x22, 0x2, 0x4) 04:18:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0xfffc) 04:18:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) [ 304.146030] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 304.254627] syz-executor.5 (12765) used greatest stack depth: 23056 bytes left 04:18:11 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) chmod(&(0x7f0000000140)='./file0/file0\x00', 0x40) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x7976432ce6a579cf) 04:18:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x6, 0x4, 0x2000000, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x6, 0x20, 0x7, "55616de7"}, 0x2, 0x0, @userptr=0xd8, 0x4}) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0xfffc) [ 304.299310] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 04:18:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) socket(0x22, 0x2, 0x4) 04:18:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) clock_gettime(0x0, &(0x7f00000000c0)) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0xfffc) 04:18:11 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000440)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KIOCSOUND(r0, 0x4b2f, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x4, 0x1, 0x1ff, r6}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000005c0)={r6, 0x4, 0x3}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000580)={r6, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}, 0x391}}}, &(0x7f0000000480)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000640)={r7, @in6={{0xa, 0x4e21, 0x18, @empty, 0x2}}, 0x8, 0x1, 0x3f, 0x40000000, 0x3ff}, &(0x7f0000000500)=0x98) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) r8 = socket$inet_tcp(0x2, 0x1, 0x0) readv(r8, &(0x7f0000000400)=[{&(0x7f0000000140)=""/135, 0x87}, {&(0x7f0000000340)=""/86, 0x56}], 0x2) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) socket(0x22, 0x2, 0x4) 04:18:11 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) 04:18:11 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:18:11 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) 04:18:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) 04:18:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x48c203, 0x20) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0xfffc) 04:18:11 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 305.092940] kauditd_printk_skb: 15 callbacks suppressed [ 305.092950] audit: type=1800 audit(1570076291.909:134): pid=12820 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17027 res=0 04:18:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) 04:18:12 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) [ 305.312868] audit: type=1804 audit(1570076291.959:135): pid=12823 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/226/file0" dev="sda1" ino=17027 res=1 [ 305.794171] device bridge_slave_1 left promiscuous mode [ 305.823126] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.870902] device bridge_slave_0 left promiscuous mode [ 305.883227] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.023997] bond1 (unregistering): Released all slaves [ 306.082397] device hsr_slave_1 left promiscuous mode [ 306.126494] device hsr_slave_0 left promiscuous mode [ 306.183342] team0 (unregistering): Port device team_slave_1 removed [ 306.194294] team0 (unregistering): Port device team_slave_0 removed [ 306.204194] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 306.254179] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 306.343449] bond0 (unregistering): Released all slaves [ 308.170961] IPVS: ftp: loaded support on port[0] = 21 [ 308.989531] chnl_net:caif_netlink_parms(): no params data found [ 309.023617] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.030442] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.037522] device bridge_slave_0 entered promiscuous mode [ 309.044885] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.051683] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.059370] device bridge_slave_1 entered promiscuous mode [ 309.078242] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 309.087516] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 309.106398] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 309.114639] team0: Port device team_slave_0 added [ 309.121914] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 309.129278] team0: Port device team_slave_1 added [ 309.134726] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 309.142116] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 309.222325] device hsr_slave_0 entered promiscuous mode [ 309.260448] device hsr_slave_1 entered promiscuous mode [ 309.300647] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 309.307920] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 309.322296] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.328856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.336533] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.343184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.371964] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 309.378431] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.387206] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 309.396100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.403711] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.412013] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.422327] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 309.428688] 8021q: adding VLAN 0 to HW filter on device team0 [ 309.438508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.446247] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.452999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.463135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.471130] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.478099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.496053] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 309.511286] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 309.522155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 309.537137] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 309.547906] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 309.558488] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 309.564994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.572657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.580876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 309.594697] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 309.606098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 309.990694] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 04:18:18 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x0, 0x3f, 0x6, 0x4}, 0x14) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0xfffc) 04:18:18 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x0) 04:18:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) [ 311.603476] audit: type=1800 audit(1570076298.419:136): pid=12879 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17069 res=0 04:18:18 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:18 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 311.714692] audit: type=1804 audit(1570076298.419:137): pid=12879 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/227/file0" dev="sda1" ino=17069 res=1 04:18:18 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) 04:18:18 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:18 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:19 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000140)={0x9, 0xffffff81}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 312.133309] audit: type=1800 audit(1570076298.949:138): pid=12916 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17069 res=0 04:18:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:19 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 312.243374] audit: type=1804 audit(1570076298.949:139): pid=12916 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/228/file0" dev="sda1" ino=17069 res=1 04:18:19 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) 04:18:19 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:19 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) 04:18:19 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_bond\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r1, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000080)=""/240) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) syz_open_pts(r2, 0x604000) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:19 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:19 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) 04:18:19 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:19 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 312.772311] audit: type=1800 audit(1570076299.589:140): pid=12963 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17056 res=0 04:18:19 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:18:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:19 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xffffffffffffff6a) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x4, 0x1, &(0x7f0000000040)=[{&(0x7f0000000580)="eb3c906d6b66732e6661dfbd28e4a0a30d8be5c98322cc962de371f61f0a850e56aa78efd09cd4de119bd8a619eeb4dedeb3855fb64f31244bf25b6408bb6b207a7b507adf24b1a7a3736856701a3aaee9d2dc7ee1556aee3eeadfa62aca6a6eb68243eda939315a24edb9061a0a53164c169e4243cc9e23259c0aca2c3283f709316c2514d9b6e75417946ad7e2929a67899b84f85cd92be446d6465d05d5f7043960c871203a15f13dec0ece53324cca212aac51731da8968b296bac0d7d5ef4119823f63de756f4ac8322dd351faa18c04c7feeb46b6118cd00"/231, 0xe7, 0x5d4d27c5}], 0x8000, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 312.850831] audit: type=1804 audit(1570076299.619:141): pid=12963 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/229/file0" dev="sda1" ino=17056 res=1 04:18:19 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) 04:18:19 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) 04:18:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:19 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) write$FUSE_POLL(r1, &(0x7f0000000140)={0x18, 0x0, 0x2, {0x7f}}, 0x18) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:20 executing program 1: r0 = open(0x0, 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) 04:18:20 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 1: r0 = open(0x0, 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 1: r0 = open(0x0, 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:20 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:20 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) r2 = dup(0xffffffffffffffff) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000400)={0x6, {0x2, 0x0, 0xe8, 0x9}, {0x87a, 0xffffffff, 0x80000001, 0xe6}, {0x8, 0x6}}) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000380)=0x800, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000001c0)=0xffffffffffffff06) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r3}}]}) fsetxattr$security_capability(r1, &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x2}, {0x7ff, 0x7}], r3}, 0x18, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:20 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) 04:18:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:20 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) setns(r1, 0x20000000) 04:18:20 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:20 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f00000001c0)='9p\x00', 0x10011, 0x0) 04:18:20 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:20 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:21 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) r1 = syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0x3, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000440)={0x71, 0x940, &(0x7f0000000400)="418f097afb0ef63c0cc9b464a5f76e69c019f3ff48fa989f93723b1ab2e5293e87b07b726dcb02", &(0x7f0000000580)="a94d0941d35e2198ec79b868439b6f464698fef23f684a862ca4663eea9a61f01d3bef1af97eaf476a845e344324f54e3ad9684d21a92c0bf6c1ffb4d256cbb618abab748c5187ba2aa7b97cdafd53d2377cc27e49745f00ad0cdceaa36bff3b3e38eef9e1dcd5865e8bd2f7dd470ba4be037d788bf847befed00bccad9a73b6737c2ed0ede3", 0x27, 0x86}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/relabel\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000340)=0x81, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r3, 0xae9a) write$P9_RCLUNK(r3, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:21 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(0x0, 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 314.386885] audit: type=1800 audit(1570076301.189:142): pid=13134 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17069 res=0 04:18:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:21 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:21 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(0x0, 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 314.608029] audit: type=1800 audit(1570076301.419:143): pid=13157 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17066 res=0 04:18:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:21 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x40, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:21 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(0x0, 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:21 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 314.913450] audit: type=1800 audit(1570076301.729:144): pid=13196 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17081 res=0 04:18:21 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000140)=0x4) fchdir(0xffffffffffffffff) getresuid(0x0, 0x0, 0x0) r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x7f, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x2000000000e000, 0xf, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) dup(r2) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:21 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 315.130444] FAT-fs (loop5): bogus number of reserved sectors 04:18:22 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 315.157900] audit: type=1800 audit(1570076301.969:145): pid=13221 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17074 res=0 [ 315.200823] FAT-fs (loop5): Can't find a valid FAT filesystem 04:18:22 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = socket(0x22, 0x2, 0x4) bind$isdn_base(r1, &(0x7f0000000040), 0x6) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000140)={{0x34, 0x5, 0x7, 0x6, 0x6}, 0x8001, 0x233, 0x401}) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:22 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:22 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:22 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) write$binfmt_elf32(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x1, 0x5, 0x4, 0x1000, 0x2, 0x3, 0x4, 0x8, 0x38, 0x1d5, 0xdd7, 0x1, 0x20, 0x2, 0xbf7, 0x6, 0x7fff}, [{0x4, 0x800, 0x10000, 0x4, 0x7ff, 0x200, 0x2, 0x6}], "fb81bae5cb21ea597ffd34c0dcb85cee532da1c472d26f717a487af7f330c66d413c655de096eaf2e32532bba0fc1fb6c5d9afcb611df05bc45b381508193d2203388a4dc038886b25cb392ec5f259266f6dc3f1955d2e8d87d994300b66bc13cf1e681f0ffe98adf5ec", [[], [], [], []]}, 0x4c2) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000340)={'dummy0\x00\x04\x00\x00\x00\xb3\xf1\x00', {0x2, 0x4e24, @loopback}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000003c0)={0x0, 0x1f7, 0x0}, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000140)) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RXATTRCREATE(r4, &(0x7f00000001c0)={0x7, 0x21, 0x2}, 0x7) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 315.894139] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=257 sclass=netlink_xfrm_socket pig=13299 comm=syz-executor.5 04:18:22 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 316.064469] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=257 sclass=netlink_xfrm_socket pig=13299 comm=syz-executor.5 04:18:22 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600), 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:23 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000580)={'syz0', "0bd8f50898ddd6958ffa70e6a6de802faf5ab27933fa2a27468a32664d86bb5b5b67f7629a36590532f68b2ba91b4bb03f2968bc81a39d75d0371f330bcfe482be4ef3485837fda1d31e1f9182ff17939f3be5e92241c509f87221b11b7580cc1c88583b7865a167a78403db86ded61eb4ba8f5c7b436bb0baa187b725f0c1183b5af6f9077224def843a6b6ca3dc38bdc6181159d9ae4543ae4597abc7b0655ae6a5e546f7296fd9b31267573fd61e4a7ee79dcc80debf810cc25138627bad9182462274c9b3e79da9eb20f91e470f980dbabf135bf"}, 0xda) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r2, &(0x7f0000000b00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, &(0x7f0000000b80)=0x80) readv(r1, &(0x7f0000000a40)=[{&(0x7f0000000680)=""/204, 0xcc}, {&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000400)=""/168, 0xa8}, {&(0x7f0000000780)=""/141, 0x8d}, {&(0x7f0000000840)=""/216, 0xd8}, {&(0x7f00000001c0)=""/25, 0x19}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f0000000940)=""/125, 0x7d}, {&(0x7f00000009c0)=""/121, 0x79}, {&(0x7f0000000500)=""/35, 0x23}], 0xa) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:23 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600), 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:23 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600), 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:23 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L-', 0x6}, 0x28, 0xde4aec5b8f2cc1cd) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:23 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x100) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:23 executing program 5: socket$netlink(0x10, 0x3, 0x16) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x800, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x3) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x6, 0x8000) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000180)={0x32, 0x2f, 0x17, 0x16, 0x5, 0x100, 0x5, 0x98, 0x1}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f00000001c0)=0xbf) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 316.872726] kauditd_printk_skb: 17 callbacks suppressed [ 316.872733] audit: type=1800 audit(1570076303.689:163): pid=13407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17055 res=0 04:18:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 317.032237] audit: type=1804 audit(1570076303.689:164): pid=13407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/248/file0" dev="sda1" ino=17055 res=1 04:18:23 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x100) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 317.239855] audit: type=1800 audit(1570076304.049:165): pid=13443 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17095 res=0 04:18:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 317.293908] audit: type=1804 audit(1570076304.099:166): pid=13448 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/249/file0" dev="sda1" ino=17095 res=1 04:18:24 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x100) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r1}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000001c0)={0x0, r0, 0x10000, 0x6, 0x100000001, 0x1ff}) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r5 = socket(0x22, 0x2, 0x4) bind$isdn_base(r5, &(0x7f0000000040), 0x6) connect$bt_sco(r5, &(0x7f00000002c0)={0x1f, {0x7f, 0x6, 0xff, 0x5, 0x7, 0x7f}}, 0x8) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) setsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000140)=0x1, 0x4) 04:18:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 317.495011] audit: type=1800 audit(1570076304.309:167): pid=13465 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17091 res=0 04:18:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 317.561431] audit: type=1804 audit(1570076304.379:168): pid=13469 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/250/file0" dev="sda1" ino=17091 res=1 04:18:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:24 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x180) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 317.757527] audit: type=1800 audit(1570076304.569:169): pid=13490 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17091 res=0 04:18:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:24 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7", 0x180) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) [ 317.806648] audit: type=1804 audit(1570076304.619:170): pid=13493 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/251/file0" dev="sda1" ino=17091 res=1 [ 317.906662] audit: type=1800 audit(1570076304.719:171): pid=13501 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17098 res=0 04:18:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) ptrace$poke(0x5, r4, &(0x7f00000001c0), 0x1400000000000) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) r5 = socket(0x22, 0x2, 0x4) openat$cgroup_procs(r2, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) bind$isdn_base(r5, &(0x7f0000000040), 0x6) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, r6, r7}, 0xc) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 317.962999] audit: type=1804 audit(1570076304.759:172): pid=13501 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/252/file0" dev="sda1" ino=17098 res=1 04:18:24 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x180) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed5039478d61a9b484b597fc35036cf6e12bb0c2123c3e0c96a24d"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='vegas\x00', 0x6) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:25 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351d", 0x1c0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1c0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351d", 0x1c0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:25 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000400)={r3}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x200000, 0x0) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="000000dbdd96af6dc41000985a0000", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x4, 0x1, 0x1ff, r7}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r5, 0x84, 0x79, &(0x7f00000005c0)={r7, 0x4, 0x3}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r7, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000340)={r8, 0xfffffffc, 0x10}, &(0x7f0000000380)=0xc) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:25 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1e0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed5039478d61a9b484b597fc35036cf6e12bb0c2123c3e0c96a24d"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1e0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:25 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1e0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:26 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1f0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:26 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x17, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000000000000}, 0x0, 0x800000000000009}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f0000000140)={0xb2, 0xfb}) 04:18:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:26 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1", 0x1f0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:26 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r1, 0xae9a) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r2, 0xc00000c0045005, &(0x7f0000000180)=0x80) write$nbd(r2, &(0x7f0000000040)=ANY=[@ANYRES64], 0x1) ioctl$TCXONC(r2, 0x540a, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0x7c, 0xd7, &(0x7f0000000140)="bea592521e22190146641204984ded62125e1f5045ed6a69745b6d8c3839c9971a8efef6c433b9edc4f64e21275c33a17245e95518698ba5d3e2d61dcb6b12a18603f4c6d5051d6e9de5b858ff32fa0483afdcb8aa6cd317ce34513ce00105da50f5a4d29b32bb20cce236ae7e24cf7e8d067da88835a00e7c707aa2", &(0x7f0000000580)=""/215, 0xd85e, 0x0, 0xc1, 0xcb, &(0x7f0000000680)="7e39f7ceb4e147d412052e8d11420f408d7f8f60fbf96bdcef8c3db12beb8dd52d8ecab37bfcb4eb5d40a8085e4b60763666b98e8f0c8bcdbdfe7cb44b75eb048f1d770eb0e140707d948040f2745a52d342c0cde96a80da5dde467acad7b367662163d592abfb0c834c343cd4bf669d3eed0fd1c84d3406310e283311d34d385fe4b445f52418953570237450d7fc89f30df096df570ca155f82ebfbf1987577687f82c568c064b63442d2b42bb86c11cdc029a15abe59d4ef264bc2db8465602", &(0x7f0000000780)="905ce3cd701b504379103dcc20cc0086466dbaf097dfca349a9618122e83a51b7ac5081b6c2ea7b105eda81c34bbf2515868c1be212b83e924175fb51861375959045a16ce81e4b88c1762d4846a34cb1c3d27346dee548bcb345a38829ab77dca139f8eb5bb2c74bf037072bea44c8267f0f50b1ec90e2bfaa440e8ac4eae381d9a0900cf02b8d9b102b7314292ccc65ce787d56499b563e2f3ddf35bd7056eb7931a2d6adb9fd02df70241730f10f9266f970524833a2b5396c9945c6caf9ad9e566d284a698161bd046"}, 0x40) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 04:18:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed5039478d61a9b484b597fc35036cf6e12bb0c2123c3e0c96a24d9fea"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:26 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1", 0x1f0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 04:18:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:27 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1f8) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 04:18:27 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1f8) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed5039478d61a9b484b597fc35036cf6e12bb0c2123c3e0c96a24d9feabd"], &(0x7f0000000240)=0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r6}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r6}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r7 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x9, 0x30}, 0xc) write$cgroup_pid(r7, &(0x7f0000000640), 0x12) 04:18:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0xbfdcd7a8c716b8b0, 0x0) r2 = accept4(r0, &(0x7f0000000400)=@l2, &(0x7f0000000380)=0x80, 0x100000) setsockopt$inet_buf(r2, 0x0, 0x0, &(0x7f0000000580)="fc8b942ad4fa66c77ae11f1509761bb5ae5e1a42ee6efa79bb982bbfef5eaa545db0158849794e77bbf95233d848c0c18442a9d8cab91f54aa4b6e546a34199870799602219550d89dfcf29463e3cf6948e98658f5398452587edf3004600bfabbef97d3a3a4872124da7e39ab59c0d84aa9a9bf953e5c17c7283a9792b9ddde1a7e108bd489ba39139b15f13cd4af6478119945e6672e562927d02de8b449ceff600069df0f2b009dc659b40c41bdf986b602a38f72f77999aa877b0e3833d69235b7b734e63b8477596a7bc2d24e1983", 0xd1) perf_event_open(&(0x7f000001d000)={0x1, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r6 = openat$cgroup_type(r4, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000001c0)={0x0, r6, 0x838, 0x6, 0xffffffffffff8001, 0x5}) keyctl$set_reqkey_keyring(0xe, 0x1) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:28 executing program 0: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r1, 0xae9a) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r2, 0xc00000c0045005, &(0x7f0000000180)=0x80) write$nbd(r2, &(0x7f0000000040)=ANY=[@ANYRES64], 0x1) ioctl$TCXONC(r2, 0x540a, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0x7c, 0xd7, &(0x7f0000000140)="bea592521e22190146641204984ded62125e1f5045ed6a69745b6d8c3839c9971a8efef6c433b9edc4f64e21275c33a17245e95518698ba5d3e2d61dcb6b12a18603f4c6d5051d6e9de5b858ff32fa0483afdcb8aa6cd317ce34513ce00105da50f5a4d29b32bb20cce236ae7e24cf7e8d067da88835a00e7c707aa2", &(0x7f0000000580)=""/215, 0xd85e, 0x0, 0xc1, 0xcb, &(0x7f0000000680)="7e39f7ceb4e147d412052e8d11420f408d7f8f60fbf96bdcef8c3db12beb8dd52d8ecab37bfcb4eb5d40a8085e4b60763666b98e8f0c8bcdbdfe7cb44b75eb048f1d770eb0e140707d948040f2745a52d342c0cde96a80da5dde467acad7b367662163d592abfb0c834c343cd4bf669d3eed0fd1c84d3406310e283311d34d385fe4b445f52418953570237450d7fc89f30df096df570ca155f82ebfbf1987577687f82c568c064b63442d2b42bb86c11cdc029a15abe59d4ef264bc2db8465602", &(0x7f0000000780)="905ce3cd701b504379103dcc20cc0086466dbaf097dfca349a9618122e83a51b7ac5081b6c2ea7b105eda81c34bbf2515868c1be212b83e924175fb51861375959045a16ce81e4b88c1762d4846a34cb1c3d27346dee548bcb345a38829ab77dca139f8eb5bb2c74bf037072bea44c8267f0f50b1ec90e2bfaa440e8ac4eae381d9a0900cf02b8d9b102b7314292ccc65ce787d56499b563e2f3ddf35bd7056eb7931a2d6adb9fd02df70241730f10f9266f970524833a2b5396c9945c6caf9ad9e566d284a698161bd046"}, 0x40) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:28 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1f8) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:28 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$KVM_NMI(r0, 0xae9a) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000340)={0x9, 0x2, 0x400, 0x40, "09fd0094d6871ec759c24a4aad0189f1f4e26eb3d452404a1d2757e8207dd19a"}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, r0, 0x7}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000380)={0x2, 0x3ff}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) connect$netrom(r5, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 04:18:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed5039478d61a9b484b597fc35036cf6e12bb0c2123c3e0c96a24d9feabd"], &(0x7f0000000240)=0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r6}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r6}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r7 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x9, 0x30}, 0xc) write$cgroup_pid(r7, &(0x7f0000000640), 0x12) 04:18:28 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fc) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:28 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed183", 0x1fc) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r6}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r6}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r7 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x9, 0x30}, 0xc) write$cgroup_pid(r7, &(0x7f0000000640), 0x12) 04:18:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:28 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fc) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) r1 = signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x8002, 0x0) r7 = creat(&(0x7f0000000440)='./file0/file0\x00', 0x8) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r10 = accept4$rose(r4, &(0x7f0000000480)=@short={0xb, @dev, @default, 0x1, @null}, &(0x7f0000000500)=0x1c, 0x800) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r12 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r12, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, 0x0, 0x0) r14 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r14, 0x0, 0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, 0x0, 0x0) r16 = socket(0x22, 0x2, 0x4) bind$isdn_base(r16, &(0x7f0000000040), 0x6) r17 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r17, 0x0, 0x0) fcntl$getownex(r17, 0x10, &(0x7f0000000580)={0x0, 0x0}) r19 = socket(0x22, 0x2, 0x4) bind$isdn_base(r19, &(0x7f0000000040), 0x6) getsockopt$inet_IP_XFRM_POLICY(r19, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r22, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r23 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r23, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r24 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r24, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r25 = socket(0x22, 0x2, 0x4) bind$isdn_base(r25, &(0x7f0000000040), 0x6) r26 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r26, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000007c0)=0x0) r28 = dup(0xffffffffffffffff) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r29}}]}) r30 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r31}, {0x8, 0x0, r31}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r32 = getpid() kcmp$KCMP_EPOLL_TFD(r32, r32, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) r33 = dup(0xffffffffffffffff) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r34}}]}) lstat(&(0x7f0000000c40)='./file0/file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r36 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r36, 0x1, 0x11, 0x0, 0x0) fcntl$getownex(r36, 0x10, &(0x7f0000000d00)={0x0, 0x0}) r38 = dup(0xffffffffffffffff) getsockopt$sock_cred(r38, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r39}}]}) r40 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r40, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r41}, {0x8, 0x0, r41}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r42 = getpid() kcmp$KCMP_EPOLL_TFD(r42, r42, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getresgid(&(0x7f0000000dc0)=0x0, &(0x7f0000000e00), &(0x7f0000000e40)) r45 = getpgrp(0x0) r46 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r46, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(r46, 0x1, 0x11, &(0x7f0000000e80)={0x0, 0x0, 0x0}, &(0x7f0000000ec0)=0xc) r48 = syz_open_dev$rtc(&(0x7f0000000f00)='/dev/rtc#\x00', 0x29, 0x0) r49 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000f40)='/selinux/mls\x00', 0x0, 0x0) r50 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r50, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r51 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r51, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r52 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r52, 0x0, 0x0) r53 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r53, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r54 = epoll_create(0x2) r55 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r55, 0x0, 0x0) r56 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000f80), &(0x7f0000000fc0)=0xe, 0x80800) r57 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r58 = socket(0x22, 0x2, 0x4) bind$isdn_base(r58, &(0x7f0000000040), 0x6) r59 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r59, 0x1, 0x11, 0x0, 0x0) r60 = dup(0xffffffffffffffff) getsockopt$sock_cred(r60, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r61}}]}) r62 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r62, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r63}, {0x8, 0x0, r63}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r64 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r64, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r65 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r65, 0x1, 0x11, 0x0, 0x0) r66 = syz_open_dev$sndseq(&(0x7f0000001280)='/dev/snd/seq\x00', 0x0, 0x0) r67 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x80, 0x0) r68 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r68, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001300)=0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000001340)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000001440)=0xe8) r71 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r71, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r72}, {0x8, 0x0, r72}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)=0x0) r74 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r74, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r75}, {0x8, 0x0, r75}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r76 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r76, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r77 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r77, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r78 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000001540)='/selinux/create\x00', 0x2, 0x0) r79 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r79, 0x1, 0x11, 0x0, 0x0) r80 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r80, 0x0, 0x0) r81 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r81, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(r4, &(0x7f0000001640)=[{&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000340)="88018d60bc1ddf632839ced07240a4cedc14f7eba035e63833491860ed1b50331cde52d8048ab90f94cf92630d0a2834623f59c32fadf19e55631a744a31d61a93bbf1efbe58a2be7ec6c0", 0x4b}], 0x1, &(0x7f0000000800)=[@rights={{0x30, 0x1, 0x1, [r5, r5, 0xffffffffffffffff, r6, r7, r8, r0, r9]}}, @rights={{0x38, 0x1, 0x1, [r0, r10, 0xffffffffffffffff, r11, r12, r5, r13, r5, r3, r14]}}, @rights={{0x18, 0x1, 0x1, [r15, r16]}}, @cred={{0x1c, 0x1, 0x2, {r18, r20, r21}}}, @rights={{0x14, 0x1, 0x1, [r22]}}, @rights={{0x28, 0x1, 0x1, [r3, r23, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [r24, r25, 0xffffffffffffffff, 0xffffffffffffffff, r3, r26]}}, @cred={{0x1c, 0x1, 0x2, {r27, r29, r31}}}], 0x128, 0x40000010}, {&(0x7f0000000940)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000c00)=[{&(0x7f00000009c0)="eeb8eadfc2a4c32244d1dc7baa6217b3fdb837af2ee3d8d5346784505d4072025c642758ccdc17e1a168", 0x2a}, {&(0x7f0000000a00)="72d38f006e6f40e6d842043fbd4b0035279acf3ba1b2186f9335da230ba09dc668a5c95b99c9fa07312632ad33f209e2839d878313a76a21e9969b38a04047208195da1f59d5be32f1da59b3df7fb1da3eeba797e129299547db5ae5bc80250df9d0433fc3882da3ff5971936a8f2e544769d893763fa9b4cb1bdd5cf3c5413384d19a7750ca36aadef1d942dafea7c0552665106c14443f9397b8d21eb25cca6dc1d82d70d4d2ef25f5e9550c453c4b79c521b37d3aa5addd17f63556e33b", 0xbf}, {&(0x7f0000000ac0)="a1ff27b6fe16c4337d0e39d7652467e81f5fe1fd0d8027fbdcc8d98b52149f0fb87e9d89d49931875d5273219094cc5e0718092648ec4a42b521b93efa63105af2b2e99334492b57392928796e4652d5341e1ae272e797104d1d190d38849436b5d407a56a03c03548e93600420537f072cde77d372e64fb8e797f", 0x7b}, {&(0x7f0000000b40)="d85c2e1bb1a94d184e4f39acb7f1624d1cfc00c78d749af3544f76491965604d258cfce073370cf410a7e071eaf225708588f05e36188a5a72425eb67f8a6c88ab2008ce422cf7cd33148ca35a11b16633731b35064925d05aeebc766e376ab63d2c34a3edd47e6d7d8d74141191f54d464aea010c3e05665f77398d691c859f3646304a3e5811c5310eec5c25940a949da66a2c403aa25ab1352c50afa5c4", 0x9f}], 0x4, &(0x7f0000001000)=[@cred={{0x1c, 0x1, 0x2, {r32, r34, r35}}}, @cred={{0x1c, 0x1, 0x2, {r37, r39, r41}}}, @cred={{0x1c, 0x1, 0x2, {r42, r43, r44}}}, @cred={{0x1c, 0x1, 0x2, {r45, 0xffffffffffffffff, r47}}}, @rights={{0x38, 0x1, 0x1, [r48, r49, r50, r2, r51, r1, r52, r53, r54, r55]}}, @rights={{0x20, 0x1, 0x1, [r56, r57, r58, r59]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r61, r63}}}, @rights={{0x18, 0x1, 0x1, [r64, r65]}}], 0x110, 0x8888}, {&(0x7f0000001140)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001240)=[{&(0x7f00000011c0)="468fc0a39f945ffedda804e868f3db83bb1259233011de1c39724a622ae8638c0d9ac926be73f04d470126f6b1d6a8ecb596bf2297a3955e57820d2f44c619c1c9cc52dcd3c2", 0x46}], 0x1, &(0x7f0000001580)=[@rights={{0x20, 0x1, 0x1, [r66, r67, r68, r0]}}, @cred={{0x1c, 0x1, 0x2, {r69, r70, r72}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r73, r75}}}, @rights={{0x2c, 0x1, 0x1, [r76, r77, r78, r79, r5, r80, r2]}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [r81]}}], 0xb8, 0x30000008}], 0x3, 0x11) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 322.133779] kauditd_printk_skb: 29 callbacks suppressed [ 322.133788] audit: type=1800 audit(1570076308.949:202): pid=13817 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16865 res=0 [ 322.174865] audit: type=1804 audit(1570076308.949:203): pid=13817 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/268/file0" dev="sda1" ino=16865 res=1 04:18:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 322.273269] ntfs: (device loop5): parse_options(): Unrecognized mount option . 04:18:29 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fe) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 322.442158] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 322.502220] audit: type=1800 audit(1570076309.319:204): pid=13847 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16625 res=0 04:18:29 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d6", 0x1fe) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) [ 322.530908] audit: type=1804 audit(1570076309.339:205): pid=13847 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/269/file0" dev="sda1" ino=16625 res=1 04:18:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 322.644479] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 322.677046] audit: type=1800 audit(1570076309.489:206): pid=13859 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16577 res=0 [ 322.701293] audit: type=1804 audit(1570076309.489:207): pid=13859 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/270/file0" dev="sda1" ino=16577 res=1 04:18:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) r1 = signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x8002, 0x0) r7 = creat(&(0x7f0000000440)='./file0/file0\x00', 0x8) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r10 = accept4$rose(r4, &(0x7f0000000480)=@short={0xb, @dev, @default, 0x1, @null}, &(0x7f0000000500)=0x1c, 0x800) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r12 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r12, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, 0x0, 0x0) r14 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r14, 0x0, 0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, 0x0, 0x0) r16 = socket(0x22, 0x2, 0x4) bind$isdn_base(r16, &(0x7f0000000040), 0x6) r17 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r17, 0x0, 0x0) fcntl$getownex(r17, 0x10, &(0x7f0000000580)={0x0, 0x0}) r19 = socket(0x22, 0x2, 0x4) bind$isdn_base(r19, &(0x7f0000000040), 0x6) getsockopt$inet_IP_XFRM_POLICY(r19, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r22, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r23 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r23, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r24 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r24, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r25 = socket(0x22, 0x2, 0x4) bind$isdn_base(r25, &(0x7f0000000040), 0x6) r26 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r26, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000007c0)=0x0) r28 = dup(0xffffffffffffffff) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r29}}]}) r30 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r31}, {0x8, 0x0, r31}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r32 = getpid() kcmp$KCMP_EPOLL_TFD(r32, r32, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) r33 = dup(0xffffffffffffffff) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r34}}]}) lstat(&(0x7f0000000c40)='./file0/file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r36 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r36, 0x1, 0x11, 0x0, 0x0) fcntl$getownex(r36, 0x10, &(0x7f0000000d00)={0x0, 0x0}) r38 = dup(0xffffffffffffffff) getsockopt$sock_cred(r38, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r39}}]}) r40 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r40, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r41}, {0x8, 0x0, r41}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r42 = getpid() kcmp$KCMP_EPOLL_TFD(r42, r42, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getresgid(&(0x7f0000000dc0)=0x0, &(0x7f0000000e00), &(0x7f0000000e40)) r45 = getpgrp(0x0) r46 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r46, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(r46, 0x1, 0x11, &(0x7f0000000e80)={0x0, 0x0, 0x0}, &(0x7f0000000ec0)=0xc) r48 = syz_open_dev$rtc(&(0x7f0000000f00)='/dev/rtc#\x00', 0x29, 0x0) r49 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000f40)='/selinux/mls\x00', 0x0, 0x0) r50 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r50, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r51 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r51, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r52 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r52, 0x0, 0x0) r53 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r53, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r54 = epoll_create(0x2) r55 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r55, 0x0, 0x0) r56 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000f80), &(0x7f0000000fc0)=0xe, 0x80800) r57 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r58 = socket(0x22, 0x2, 0x4) bind$isdn_base(r58, &(0x7f0000000040), 0x6) r59 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r59, 0x1, 0x11, 0x0, 0x0) r60 = dup(0xffffffffffffffff) getsockopt$sock_cred(r60, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r61}}]}) r62 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r62, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r63}, {0x8, 0x0, r63}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r64 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r64, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r65 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r65, 0x1, 0x11, 0x0, 0x0) r66 = syz_open_dev$sndseq(&(0x7f0000001280)='/dev/snd/seq\x00', 0x0, 0x0) r67 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x80, 0x0) r68 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r68, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001300)=0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000001340)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000001440)=0xe8) r71 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r71, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r72}, {0x8, 0x0, r72}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)=0x0) r74 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r74, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r75}, {0x8, 0x0, r75}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r76 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r76, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r77 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r77, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r78 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000001540)='/selinux/create\x00', 0x2, 0x0) r79 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r79, 0x1, 0x11, 0x0, 0x0) r80 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r80, 0x0, 0x0) r81 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r81, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(r4, &(0x7f0000001640)=[{&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000340)="88018d60bc1ddf632839ced07240a4cedc14f7eba035e63833491860ed1b50331cde52d8048ab90f94cf92630d0a2834623f59c32fadf19e55631a744a31d61a93bbf1efbe58a2be7ec6c0", 0x4b}], 0x1, &(0x7f0000000800)=[@rights={{0x30, 0x1, 0x1, [r5, r5, 0xffffffffffffffff, r6, r7, r8, r0, r9]}}, @rights={{0x38, 0x1, 0x1, [r0, r10, 0xffffffffffffffff, r11, r12, r5, r13, r5, r3, r14]}}, @rights={{0x18, 0x1, 0x1, [r15, r16]}}, @cred={{0x1c, 0x1, 0x2, {r18, r20, r21}}}, @rights={{0x14, 0x1, 0x1, [r22]}}, @rights={{0x28, 0x1, 0x1, [r3, r23, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [r24, r25, 0xffffffffffffffff, 0xffffffffffffffff, r3, r26]}}, @cred={{0x1c, 0x1, 0x2, {r27, r29, r31}}}], 0x128, 0x40000010}, {&(0x7f0000000940)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000c00)=[{&(0x7f00000009c0)="eeb8eadfc2a4c32244d1dc7baa6217b3fdb837af2ee3d8d5346784505d4072025c642758ccdc17e1a168", 0x2a}, {&(0x7f0000000a00)="72d38f006e6f40e6d842043fbd4b0035279acf3ba1b2186f9335da230ba09dc668a5c95b99c9fa07312632ad33f209e2839d878313a76a21e9969b38a04047208195da1f59d5be32f1da59b3df7fb1da3eeba797e129299547db5ae5bc80250df9d0433fc3882da3ff5971936a8f2e544769d893763fa9b4cb1bdd5cf3c5413384d19a7750ca36aadef1d942dafea7c0552665106c14443f9397b8d21eb25cca6dc1d82d70d4d2ef25f5e9550c453c4b79c521b37d3aa5addd17f63556e33b", 0xbf}, {&(0x7f0000000ac0)="a1ff27b6fe16c4337d0e39d7652467e81f5fe1fd0d8027fbdcc8d98b52149f0fb87e9d89d49931875d5273219094cc5e0718092648ec4a42b521b93efa63105af2b2e99334492b57392928796e4652d5341e1ae272e797104d1d190d38849436b5d407a56a03c03548e93600420537f072cde77d372e64fb8e797f", 0x7b}, {&(0x7f0000000b40)="d85c2e1bb1a94d184e4f39acb7f1624d1cfc00c78d749af3544f76491965604d258cfce073370cf410a7e071eaf225708588f05e36188a5a72425eb67f8a6c88ab2008ce422cf7cd33148ca35a11b16633731b35064925d05aeebc766e376ab63d2c34a3edd47e6d7d8d74141191f54d464aea010c3e05665f77398d691c859f3646304a3e5811c5310eec5c25940a949da66a2c403aa25ab1352c50afa5c4", 0x9f}], 0x4, &(0x7f0000001000)=[@cred={{0x1c, 0x1, 0x2, {r32, r34, r35}}}, @cred={{0x1c, 0x1, 0x2, {r37, r39, r41}}}, @cred={{0x1c, 0x1, 0x2, {r42, r43, r44}}}, @cred={{0x1c, 0x1, 0x2, {r45, 0xffffffffffffffff, r47}}}, @rights={{0x38, 0x1, 0x1, [r48, r49, r50, r2, r51, r1, r52, r53, r54, r55]}}, @rights={{0x20, 0x1, 0x1, [r56, r57, r58, r59]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r61, r63}}}, @rights={{0x18, 0x1, 0x1, [r64, r65]}}], 0x110, 0x8888}, {&(0x7f0000001140)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001240)=[{&(0x7f00000011c0)="468fc0a39f945ffedda804e868f3db83bb1259233011de1c39724a622ae8638c0d9ac926be73f04d470126f6b1d6a8ecb596bf2297a3955e57820d2f44c619c1c9cc52dcd3c2", 0x46}], 0x1, &(0x7f0000001580)=[@rights={{0x20, 0x1, 0x1, [r66, r67, r68, r0]}}, @cred={{0x1c, 0x1, 0x2, {r69, r70, r72}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r73, r75}}}, @rights={{0x2c, 0x1, 0x1, [r76, r77, r78, r79, r5, r80, r2]}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [r81]}}], 0xb8, 0x30000008}], 0x3, 0x11) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:29 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fe) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:29 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 322.937383] audit: type=1800 audit(1570076309.749:208): pid=13878 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16625 res=0 04:18:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:29 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d634", 0x1ff) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:30 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1ff) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) r1 = signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x8002, 0x0) r7 = creat(&(0x7f0000000440)='./file0/file0\x00', 0x8) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r10 = accept4$rose(r4, &(0x7f0000000480)=@short={0xb, @dev, @default, 0x1, @null}, &(0x7f0000000500)=0x1c, 0x800) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r12 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r12, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, 0x0, 0x0) r14 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r14, 0x0, 0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, 0x0, 0x0) r16 = socket(0x22, 0x2, 0x4) bind$isdn_base(r16, &(0x7f0000000040), 0x6) r17 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r17, 0x0, 0x0) fcntl$getownex(r17, 0x10, &(0x7f0000000580)={0x0, 0x0}) r19 = socket(0x22, 0x2, 0x4) bind$isdn_base(r19, &(0x7f0000000040), 0x6) getsockopt$inet_IP_XFRM_POLICY(r19, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r22, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r23 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r23, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r24 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r24, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r25 = socket(0x22, 0x2, 0x4) bind$isdn_base(r25, &(0x7f0000000040), 0x6) r26 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r26, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000007c0)=0x0) r28 = dup(0xffffffffffffffff) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r29}}]}) r30 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r31}, {0x8, 0x0, r31}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r32 = getpid() kcmp$KCMP_EPOLL_TFD(r32, r32, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) r33 = dup(0xffffffffffffffff) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r34}}]}) lstat(&(0x7f0000000c40)='./file0/file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r36 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r36, 0x1, 0x11, 0x0, 0x0) fcntl$getownex(r36, 0x10, &(0x7f0000000d00)={0x0, 0x0}) r38 = dup(0xffffffffffffffff) getsockopt$sock_cred(r38, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r39}}]}) r40 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r40, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r41}, {0x8, 0x0, r41}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r42 = getpid() kcmp$KCMP_EPOLL_TFD(r42, r42, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getresgid(&(0x7f0000000dc0)=0x0, &(0x7f0000000e00), &(0x7f0000000e40)) r45 = getpgrp(0x0) r46 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r46, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(r46, 0x1, 0x11, &(0x7f0000000e80)={0x0, 0x0, 0x0}, &(0x7f0000000ec0)=0xc) r48 = syz_open_dev$rtc(&(0x7f0000000f00)='/dev/rtc#\x00', 0x29, 0x0) r49 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000f40)='/selinux/mls\x00', 0x0, 0x0) r50 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r50, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r51 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r51, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r52 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r52, 0x0, 0x0) r53 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r53, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r54 = epoll_create(0x2) r55 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r55, 0x0, 0x0) r56 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000f80), &(0x7f0000000fc0)=0xe, 0x80800) r57 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r58 = socket(0x22, 0x2, 0x4) bind$isdn_base(r58, &(0x7f0000000040), 0x6) r59 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r59, 0x1, 0x11, 0x0, 0x0) r60 = dup(0xffffffffffffffff) getsockopt$sock_cred(r60, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r61}}]}) r62 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r62, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r63}, {0x8, 0x0, r63}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r64 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r64, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r65 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r65, 0x1, 0x11, 0x0, 0x0) r66 = syz_open_dev$sndseq(&(0x7f0000001280)='/dev/snd/seq\x00', 0x0, 0x0) r67 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x80, 0x0) r68 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r68, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001300)=0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000001340)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000001440)=0xe8) r71 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r71, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r72}, {0x8, 0x0, r72}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)=0x0) r74 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r74, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r75}, {0x8, 0x0, r75}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r76 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r76, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r77 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r77, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) r78 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000001540)='/selinux/create\x00', 0x2, 0x0) r79 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r79, 0x1, 0x11, 0x0, 0x0) r80 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r80, 0x0, 0x0) r81 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r81, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(r4, &(0x7f0000001640)=[{&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000340)="88018d60bc1ddf632839ced07240a4cedc14f7eba035e63833491860ed1b50331cde52d8048ab90f94cf92630d0a2834623f59c32fadf19e55631a744a31d61a93bbf1efbe58a2be7ec6c0", 0x4b}], 0x1, &(0x7f0000000800)=[@rights={{0x30, 0x1, 0x1, [r5, r5, 0xffffffffffffffff, r6, r7, r8, r0, r9]}}, @rights={{0x38, 0x1, 0x1, [r0, r10, 0xffffffffffffffff, r11, r12, r5, r13, r5, r3, r14]}}, @rights={{0x18, 0x1, 0x1, [r15, r16]}}, @cred={{0x1c, 0x1, 0x2, {r18, r20, r21}}}, @rights={{0x14, 0x1, 0x1, [r22]}}, @rights={{0x28, 0x1, 0x1, [r3, r23, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [r24, r25, 0xffffffffffffffff, 0xffffffffffffffff, r3, r26]}}, @cred={{0x1c, 0x1, 0x2, {r27, r29, r31}}}], 0x128, 0x40000010}, {&(0x7f0000000940)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000c00)=[{&(0x7f00000009c0)="eeb8eadfc2a4c32244d1dc7baa6217b3fdb837af2ee3d8d5346784505d4072025c642758ccdc17e1a168", 0x2a}, {&(0x7f0000000a00)="72d38f006e6f40e6d842043fbd4b0035279acf3ba1b2186f9335da230ba09dc668a5c95b99c9fa07312632ad33f209e2839d878313a76a21e9969b38a04047208195da1f59d5be32f1da59b3df7fb1da3eeba797e129299547db5ae5bc80250df9d0433fc3882da3ff5971936a8f2e544769d893763fa9b4cb1bdd5cf3c5413384d19a7750ca36aadef1d942dafea7c0552665106c14443f9397b8d21eb25cca6dc1d82d70d4d2ef25f5e9550c453c4b79c521b37d3aa5addd17f63556e33b", 0xbf}, {&(0x7f0000000ac0)="a1ff27b6fe16c4337d0e39d7652467e81f5fe1fd0d8027fbdcc8d98b52149f0fb87e9d89d49931875d5273219094cc5e0718092648ec4a42b521b93efa63105af2b2e99334492b57392928796e4652d5341e1ae272e797104d1d190d38849436b5d407a56a03c03548e93600420537f072cde77d372e64fb8e797f", 0x7b}, {&(0x7f0000000b40)="d85c2e1bb1a94d184e4f39acb7f1624d1cfc00c78d749af3544f76491965604d258cfce073370cf410a7e071eaf225708588f05e36188a5a72425eb67f8a6c88ab2008ce422cf7cd33148ca35a11b16633731b35064925d05aeebc766e376ab63d2c34a3edd47e6d7d8d74141191f54d464aea010c3e05665f77398d691c859f3646304a3e5811c5310eec5c25940a949da66a2c403aa25ab1352c50afa5c4", 0x9f}], 0x4, &(0x7f0000001000)=[@cred={{0x1c, 0x1, 0x2, {r32, r34, r35}}}, @cred={{0x1c, 0x1, 0x2, {r37, r39, r41}}}, @cred={{0x1c, 0x1, 0x2, {r42, r43, r44}}}, @cred={{0x1c, 0x1, 0x2, {r45, 0xffffffffffffffff, r47}}}, @rights={{0x38, 0x1, 0x1, [r48, r49, r50, r2, r51, r1, r52, r53, r54, r55]}}, @rights={{0x20, 0x1, 0x1, [r56, r57, r58, r59]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r61, r63}}}, @rights={{0x18, 0x1, 0x1, [r64, r65]}}], 0x110, 0x8888}, {&(0x7f0000001140)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001240)=[{&(0x7f00000011c0)="468fc0a39f945ffedda804e868f3db83bb1259233011de1c39724a622ae8638c0d9ac926be73f04d470126f6b1d6a8ecb596bf2297a3955e57820d2f44c619c1c9cc52dcd3c2", 0x46}], 0x1, &(0x7f0000001580)=[@rights={{0x20, 0x1, 0x1, [r66, r67, r68, r0]}}, @cred={{0x1c, 0x1, 0x2, {r69, r70, r72}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r73, r75}}}, @rights={{0x2c, 0x1, 0x1, [r76, r77, r78, r79, r5, r80, r2]}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [r81]}}], 0xb8, 0x30000008}], 0x3, 0x11) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:30 executing program 5: socket$netlink(0x10, 0x3, 0x0) fchdir(0xffffffffffffffff) r0 = socket(0x22, 0x2, 0x4) bind$isdn_base(r0, &(0x7f0000000040), 0x6) signalfd(r0, 0x0, 0xfffffffffffffcb3) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0xe, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:30 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1ff) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 04:18:30 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 04:18:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:30 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r1}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000001c0)={0x0, r0, 0x10000, 0x6, 0x100000001, 0x1ff}) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r5 = socket(0x22, 0x2, 0x4) bind$isdn_base(r5, &(0x7f0000000040), 0x6) connect$bt_sco(r5, &(0x7f00000002c0)={0x1f, {0x7f, 0x6, 0xff, 0x5, 0x7, 0x7f}}, 0x8) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) setsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000140)=0x1, 0x4) 04:18:30 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) syz_open_dev$adsp(&(0x7f0000000780)='/dev/adsp#\x00', 0x89, 0x440001) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) preadv(r1, &(0x7f0000000500)=[{&(0x7f0000000180)=""/65, 0x41}, {&(0x7f0000000680)=""/250, 0xfa}, {&(0x7f0000000340)=""/113, 0x71}], 0x3, 0x5) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000580)=""/217, &(0x7f0000000140)=0xd9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 04:18:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 04:18:30 executing program 0: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 04:18:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8f, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000180)=0x7, 0x4) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000140)) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 04:18:31 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 04:18:31 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140), &(0x7f00000001c0)=0x4) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:31 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:31 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) r1 = socket(0x22, 0x2, 0x4) bind$isdn_base(r1, &(0x7f0000000040), 0x6) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20102, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8c2200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0xf, @binary}]}, 0x18}, 0x1, 0xfdffffff00000000, 0x0, 0x40050}, 0x0) 04:18:32 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:32 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:32 executing program 2 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:32 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 325.537999] FAULT_INJECTION: forcing a failure. [ 325.537999] name failslab, interval 1, probability 0, space 0, times 0 [ 325.612904] CPU: 1 PID: 14102 Comm: syz-executor.2 Not tainted 4.14.146 #0 [ 325.621215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.621306] Call Trace: [ 325.621331] dump_stack+0x138/0x197 [ 325.621349] should_fail.cold+0x10f/0x159 [ 325.621365] should_failslab+0xdb/0x130 [ 325.621376] __kmalloc+0x2f0/0x7a0 [ 325.621386] ? __lock_is_held+0xb6/0x140 04:18:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) [ 325.621399] ? perf_read+0x248/0x820 [ 325.621411] perf_read+0x248/0x820 [ 325.621420] ? lock_downgrade+0x6e0/0x6e0 [ 325.621432] ? __perf_read_group_add+0x680/0x680 [ 325.621444] ? trace_hardirqs_on+0x10/0x10 [ 325.621454] ? selinux_is_enabled+0x9/0x50 [ 325.621465] ? creds_are_invalid+0x48/0x110 [ 325.621475] ? fsnotify+0x92f/0x11e0 [ 325.621492] __vfs_read+0x105/0x6a0 [ 325.621502] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 325.621511] ? __perf_read_group_add+0x680/0x680 [ 325.621525] ? vfs_copy_file_range+0xa40/0xa40 [ 325.621538] ? selinux_file_permission+0x85/0x480 [ 325.621550] ? security_file_permission+0x89/0x1f0 [ 325.621561] ? rw_verify_area+0xea/0x2b0 [ 325.621572] vfs_read+0x137/0x350 [ 325.621586] SyS_read+0xfd/0x230 [ 325.637202] ? kernel_write+0x120/0x120 [ 325.637212] ? do_syscall_64+0x53/0x640 [ 325.637223] ? kernel_write+0x120/0x120 [ 325.637233] do_syscall_64+0x1e8/0x640 [ 325.637240] ? trace_hardirqs_off_thunk+0x1a/0x1c 04:18:32 executing program 2 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 325.637257] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 325.652103] RIP: 0033:0x459a29 [ 325.652109] RSP: 002b:00007f280e50ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 325.652118] RAX: ffffffffffffffda RBX: 00007f280e50ec90 RCX: 0000000000459a29 [ 325.652123] RDX: 0000000000000075 RSI: 00000000200002c0 RDI: 0000000000000004 [ 325.652128] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 325.652133] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f280e50f6d4 [ 325.652138] R13: 00000000004c5ee2 R14: 00000000004dc880 R15: 0000000000000005 04:18:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x82402, 0x0) r1 = socket(0x22, 0x2, 0x4) bind$isdn_base(r1, &(0x7f0000000040), 0x6) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U+', 0xccc2}, 0x28, 0x6) socket$kcm(0x29, 0x0, 0x0) 04:18:32 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x31, 0x0, 0x800041c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101c81, 0x0) r2 = getpid() kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) r3 = getpid() kcmp$KCMP_EPOLL_TFD(r3, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) r4 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r4, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRESOCT=r2, @ANYRES32=r4, @ANYRES16], 0x21) 04:18:32 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:33 executing program 3 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r2 = socket(0x22, 0x2, 0x4) bind$isdn_base(r2, &(0x7f0000000040), 0x6) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000040)=0x2, 0x4) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) r3 = getpid() kcmp$KCMP_EPOLL_TFD(r3, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) syz_open_procfs(r3, &(0x7f0000000200)='coredump_filter\x00') listen(r1, 0x0) r4 = dup2(0xffffffffffffffff, r1) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000080)=""/240) ioctl$TIOCGPGRP(r4, 0x540f, 0x0) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$UI_SET_PHYS(r4, 0x4008556c, &(0x7f0000000000)='syz1\x00') 04:18:33 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) setsockopt$inet6_dccp_int(r1, 0x21, 0x13, &(0x7f00000001c0)=0x80000001, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000880)={{{@in=@empty, @in6=@initdev}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000400)={{0x0, 0xf9}, 'port1\x00', 0x8, 0x4, 0x9, 0x6, 0x9, 0x400, 0x2, 0x0, 0x6, 0x3f}) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) sendmmsg(r4, &(0x7f0000005c00), 0x605, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:33 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) [ 326.305542] FAULT_INJECTION: forcing a failure. [ 326.305542] name failslab, interval 1, probability 0, space 0, times 0 [ 326.324977] FAULT_INJECTION: forcing a failure. [ 326.324977] name failslab, interval 1, probability 0, space 0, times 0 [ 326.346040] CPU: 1 PID: 14151 Comm: syz-executor.3 Not tainted 4.14.146 #0 [ 326.353153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.362613] Call Trace: [ 326.362639] dump_stack+0x138/0x197 [ 326.362667] should_fail.cold+0x10f/0x159 [ 326.362687] should_failslab+0xdb/0x130 [ 326.362701] __kmalloc+0x2f0/0x7a0 [ 326.362714] ? __lock_is_held+0xb6/0x140 [ 326.362732] ? perf_read+0x248/0x820 [ 326.362747] perf_read+0x248/0x820 [ 326.362765] ? __perf_read_group_add+0x680/0x680 [ 326.362776] ? trace_hardirqs_on+0x10/0x10 [ 326.362789] ? selinux_is_enabled+0x9/0x50 [ 326.362803] ? creds_are_invalid+0x48/0x110 [ 326.362814] ? fsnotify+0x92f/0x11e0 [ 326.362841] __vfs_read+0x105/0x6a0 [ 326.362854] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 326.362868] ? __perf_read_group_add+0x680/0x680 [ 326.362883] ? vfs_copy_file_range+0xa40/0xa40 [ 326.362905] ? selinux_file_permission+0x85/0x480 [ 326.362927] ? security_file_permission+0x89/0x1f0 [ 326.362946] ? rw_verify_area+0xea/0x2b0 [ 326.362966] vfs_read+0x137/0x350 [ 326.362988] SyS_read+0xfd/0x230 [ 326.363004] ? kernel_write+0x120/0x120 [ 326.363017] ? do_syscall_64+0x53/0x640 [ 326.363033] ? kernel_write+0x120/0x120 [ 326.363057] do_syscall_64+0x1e8/0x640 [ 326.363072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 326.401638] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 326.401650] RIP: 0033:0x459a29 [ 326.401659] RSP: 002b:00007f365746ec78 EFLAGS: 00000246 [ 326.410457] ORIG_RAX: 0000000000000000 [ 326.410465] RAX: ffffffffffffffda RBX: 00007f365746ec90 RCX: 0000000000459a29 [ 326.410472] RDX: 0000000000000075 RSI: 00000000200002c0 RDI: 0000000000000004 [ 326.410477] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 326.410484] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f365746f6d4 [ 326.410490] R13: 00000000004c5ee2 R14: 00000000004dc880 R15: 0000000000000005 [ 326.421444] CPU: 1 PID: 14152 Comm: syz-executor.0 Not tainted 4.14.146 #0 [ 326.460092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.460099] Call Trace: [ 326.460117] dump_stack+0x138/0x197 [ 326.460139] should_fail.cold+0x10f/0x159 [ 326.460163] should_failslab+0xdb/0x130 [ 326.460179] __kmalloc+0x2f0/0x7a0 [ 326.460191] ? __lock_is_held+0xb6/0x140 [ 326.460211] ? perf_read+0x248/0x820 [ 326.460230] perf_read+0x248/0x820 [ 326.460248] ? __perf_read_group_add+0x680/0x680 [ 326.460260] ? trace_hardirqs_on+0x10/0x10 [ 326.460273] ? selinux_is_enabled+0x9/0x50 [ 326.502513] ? creds_are_invalid+0x48/0x110 [ 326.502527] ? fsnotify+0x92f/0x11e0 [ 326.502573] __vfs_read+0x105/0x6a0 04:18:33 executing program 2: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8b, 0x80001) getsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 04:18:33 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000}, 0x0, 0x0, r0, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f00000002c0)=""/117, 0x75) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) read(r1, &(0x7f00000002c0)=""/117, 0x75) [ 326.502585] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 326.502596] ? __perf_read_group_add+0x680/0x680 [ 326.502609] ? vfs_copy_file_range+0xa40/0xa40 [ 326.502629] ? selinux_file_permission+0x85/0x480 [ 326.502646] ? security_file_permission+0x89/0x1f0 [ 326.502662] ? rw_verify_area+0xea/0x2b0 [ 326.502677] vfs_read+0x137/0x350 [ 326.502695] SyS_read+0xfd/0x230 [ 326.502710] ? kernel_write+0x120/0x120 [ 326.502721] ? do_syscall_64+0x53/0x640 [ 326.502740] ? kernel_write+0x120/0x120 04:18:33 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:33 executing program 3 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 326.563447] do_syscall_64+0x1e8/0x640 [ 326.563462] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 326.563489] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 326.563500] RIP: 0033:0x459a29 [ 326.588211] RSP: 002b:00007ff31dd34c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 326.588228] RAX: ffffffffffffffda RBX: 00007ff31dd34c90 RCX: 0000000000459a29 [ 326.588237] RDX: 0000000000000075 RSI: 00000000200002c0 RDI: 0000000000000004 [ 326.588245] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:18:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) [ 326.588252] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff31dd356d4 [ 326.588260] R13: 00000000004c5ee2 R14: 00000000004dc880 R15: 0000000000000005 04:18:33 executing program 0 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:33 executing program 3: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0xc00000, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000000480)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000004c0)={@ipv4={[], [], @local}, 0xa, r3}) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) r6 = dup(0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r7}}]}) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000100)={{{@in, @in=@multicast2, 0x4e20, 0x5, 0x4e22, 0x0, 0xa, 0x110, 0x0, 0x88, r5, r7}, {0x3, 0xff, 0x5, 0xffff, 0x87, 0x9, 0x9, 0x8}, {0x100, 0x80000001, 0x7fffffff, 0x603d700f}, 0xffff0001, 0x6e6bb4, 0x2, 0x1, 0x2, 0x3}, {{@in=@rand_addr=0x8, 0x4d4, 0x2b}, 0x1d2fee7100ec4f61, @in=@remote, 0x3500, 0x0, 0x1, 0x40, 0xfff, 0x0, 0x5}}, 0xe8) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:33 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r5}}, 0x24}}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000140)=r5) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setpipe(r0, 0x407, 0xfc) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r0, 0xae9a) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000000)={0x4, 0xff, 0xffff}) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@null=' \x00', 0x3, 'team_slave_0\x00'}) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x400, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xe) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e22, 0x7, @rand_addr="7f7d5c41670c1cb5d7ff5c9f5b30914c", 0x1ac0}, {0xa, 0x4e20, 0x0, @empty, 0xf2}, 0x7fff, [0xc0000000, 0x7, 0x7f, 0x6, 0x9, 0xb, 0x3ff, 0x1000]}, 0x5c) 04:18:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x8, 0x0, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa44}, 0x0, 0x0, 0x0, 0x8, 0x47d441e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000040)=0x400) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x5, 0x40) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f00000000c0)=0x8, 0x4) 04:18:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:34 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:34 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r4 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x1000, 0x103201) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, 0x0, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$rose(r3, &(0x7f0000000500)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default]}, 0x40) sendmsg$nl_xfrm(r6, 0x0, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, 0x0, 0x0) fremovexattr(r7, &(0x7f0000000580)=ANY=[@ANYBLOB="6f73322e2f6465762f61646d6469230072b8cbe974c67c9cc71bacfd21e613c60d79a234e8c1b6635aeed9efc57d66632628b21093ebde11d5258945f26a4c6d6742c311c1fe19aaea4904e672f3612aaadd7a13c218ca294c1065986e795113f1f19e17fdcb6a030b54d163130d9e7f811216d97962196e2694b9ca9f265cea9f976f094ad0525800"]) r8 = accept$packet(r3, 0x0, &(0x7f00000001c0)) ppoll(&(0x7f0000000340)=[{r4, 0x1}, {0xffffffffffffffff, 0x400}, {r5, 0x8040}, {r6, 0x2558}, {r8, 0x8000}, {r0, 0x8000}], 0x6, &(0x7f0000000380), &(0x7f0000000400)={0x81}, 0x8) setsockopt$inet6_int(r2, 0x29, 0x1, &(0x7f0000000140)=0xfdd, 0x4) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000440)=0x3, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r2, 0x0, 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-monitor\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r3, &(0x7f00000002c0)=""/117, 0x75) 04:18:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x2, 0x40000) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x12, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}, {@mmap='mmap'}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@measure='measure'}, {@seclabel='seclabel'}]}}) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f00000002c0)=""/117, 0x75) [ 327.355429] kauditd_printk_skb: 22 callbacks suppressed [ 327.355437] audit: type=1800 audit(1570076314.159:230): pid=14233 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17104 res=0 04:18:34 executing program 2: r0 = socket(0x22, 0x2, 0x4) bind$isdn_base(r0, &(0x7f0000000040), 0x6) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmsg(r1, &(0x7f0000001340)={&(0x7f0000000100)=@hci, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)=""/98, 0x62}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2, &(0x7f0000000240)=""/106, 0x6a}, 0x10000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0xfa18, &(0x7f0000000040)=""/137) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8800, 0x8000000000000000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$TCFLSH(r4, 0x540b, 0x4) read(r3, &(0x7f00000002c0)=""/117, 0x75) 04:18:34 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f0000000140), 0x800) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 327.560207] audit: type=1804 audit(1570076314.179:231): pid=14233 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/282/file0" dev="sda1" ino=17104 res=1 04:18:34 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x104, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r2, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r2, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000080)=""/240) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r7 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r8 = userfaultfd(0x0) ioctl$UFFDIO_API(r8, 0xc018aa3f, &(0x7f00000002c0)) ioctl$UFFDIO_REGISTER(r8, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r9, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$IP_VS_SO_GET_SERVICE(r9, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000240)=0x68) dup2(r7, r9) dup3(r7, r8, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) 04:18:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed5039478d61a9b484b597fc35036cf6e12bb0c2123c3e0c96a24d9feabd"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:34 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:34 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r2 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x8000, 0x1, &(0x7f0000000340)=[{&(0x7f0000000580)="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", 0x1000, 0x8}], 0x1c001, &(0x7f0000000400)={[{@gid={'gid', 0x3d, r2}}, {@creator={'creator', 0x3d, "d2817a81"}}, {@uid={'uid', 0x3d, r3}}], [{@dont_hash='dont_hash'}, {@obj_user={'obj_user', 0x3d, 'posix_acl_accessself\\[md5sum*.'}}]}) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000140)=0x10001, 0x4) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000500)={0x16, 0x17, 0x1, {0xd, './file0/file0'}}, 0x16) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) fchdir(r6) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 327.950303] audit: type=1800 audit(1570076314.759:232): pid=14273 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17104 res=0 04:18:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x4b0040, 0x0) write$selinux_access(r1, &(0x7f0000000100)={'system_u:object_r:dbusd_exec_t:s0', 0x20, 'unconfined', 0x20, 0x5c0}, 0x42) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x8000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000040)={0x724ad85e, 0x2, {0x1, 0x3, 0x86, 0x282034a82eba315a, 0x5}}) 04:18:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x2d, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000080)=""/240) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000000)={[0x100000001, 0x35f, 0x8001, 0x9, 0xbc0a, 0x5, 0x4, 0x2, 0x631, 0xcdb0291, 0x2, 0x1, 0xffffffffffff0000, 0x6d, 0xea, 0xc50], 0x1, 0x272000}) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f00000002c0)=""/117, 0x75) 04:18:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) [ 328.082089] audit: type=1804 audit(1570076314.799:233): pid=14278 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/283/file0" dev="sda1" ino=17104 res=1 04:18:35 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r0) r2 = dup(0xffffffffffffffff) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000140)={0x7, 0x0, 0x1, 0xdcb3}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000180)={0x10000, r3}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_selinux(r4, &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:dhcpd_state_t:s0\x00', 0x23, 0x5) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) getpeername(r2, &(0x7f00000000c0)=@can, &(0x7f0000000140)=0x80) read$alg(r1, &(0x7f0000000000)=""/169, 0xa9) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:35 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x462000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], 0x4}) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 328.486281] audit: type=1800 audit(1570076315.299:234): pid=14314 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17104 res=0 04:18:35 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000140)=0x1ff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 328.610132] audit: type=1804 audit(1570076315.329:235): pid=14315 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/284/file0" dev="sda1" ino=17104 res=1 04:18:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:35 executing program 2: ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000000)={0xccac, 0x3ff, 0x7, 'queue1\x00', 0x5}) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r1 = getpid() kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) r2 = socket(0x22, 0x2, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000001c0)=0x68) bind$isdn_base(r2, &(0x7f0000000040), 0x6) r3 = accept$inet6(r2, &(0x7f0000000100), &(0x7f0000000140)=0x1c) r4 = socket(0x22, 0x2, 0x4) bind$isdn_base(r4, &(0x7f0000000040), 0x6) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r3, &(0x7f0000000180)={0xffffffffffffffff, r4, 0x1ff}) 04:18:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = dup(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r2}}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r5}, {0x8, 0x0, r5}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r6 = socket(0x22, 0x2, 0x4) bind$isdn_base(r6, &(0x7f0000000040), 0x6) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r9}, {0x8, 0x0, r9}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r11}, {0x8, 0x0, r11}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r13}, {0x8, 0x0, r13}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) getgroups(0x9, &(0x7f00000001c0)=[0xee01, 0xffffffffffffffff, r11, 0xee00, r13, 0xee01, 0xffffffffffffffff, 0x0, 0x0]) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {0x1, 0xe4da89d324eac83c}, [{0x2, 0x5, r2}], {0x4, 0x5}, [{0x8, 0x2, r3}, {0x8, 0x1, r5}, {0x8, 0xdf91b97a3fd5c8e0, r7}, {0x8, 0x3, r9}, {0x8, 0x0, r14}], {0x10, 0x2}, {0x20, 0x3}}, 0x54, 0x1) 04:18:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40b000000000000691044000000000000000000000010009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xffffffffffffffcc, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x1dd}, 0x48) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r0, 0xae9a) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r1, 0xae9a) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x4013d2ee0fc0d442, r1}) r2 = perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) read(r2, &(0x7f00000002c0)=""/117, 0x73df55a62037785f) syz_init_net_socket$ax25(0x3, 0x5, 0xc4) 04:18:35 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 328.835158] ntfs: (device loop0): parse_options(): Unrecognized mount option . 04:18:35 executing program 2: r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x100, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x1, 0x0, 0x20, 0x0, 0x0, 0x8, 0x88000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x1012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0x5, r1, 0x11) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f00000002c0)=""/117, 0x75) 04:18:35 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000040)={{0xff, 0xd8}, 'port1\x00', 0x2, 0x20, 0x610a, 0x398, 0x1, 0x3ff, 0x586, 0x0, 0x4, 0xffffffff}) [ 329.098028] audit: type=1800 audit(1570076315.909:236): pid=14361 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16865 res=0 [ 329.223404] audit: type=1804 audit(1570076315.919:237): pid=14361 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir584138644/syzkaller.ssxVee/285/file0" dev="sda1" ino=16865 res=1 04:18:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:36 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r0, 0xae9a) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{0x3ff, 0xae, 0x7, 0x1}, 'syz0\x00', 0x33}) r1 = dup(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r3, &(0x7f00000002c0)=""/117, 0x75) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x301000, 0x0) ioctl$sock_ax25_SIOCADDRT(r4, 0x890b, &(0x7f0000000180)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x65, &(0x7f0000000240)=[@in6={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0x14}, 0x40}], 0x1c) r6 = dup(0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r7, &(0x7f0000000480), 0x10000000000002a1, 0x0) r8 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r8, 0xae9a) ioctl$VIDIOC_G_ENC_INDEX(r8, 0x8818564c, &(0x7f0000000340)) 04:18:36 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) r0 = socket(0x22, 0x2, 0x4) bind$isdn_base(r0, &(0x7f0000000040), 0x6) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x44) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {}, {0x2, 0x0, @broadcast}, 0x6a, 0x0, 0x2, 0x46a}) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0xffffffffffffff6e, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/pid\x00') read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x80000000) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:36 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 04:18:36 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x7a3020, 0x0) setns(r0, 0x50000000) r1 = perf_event_open(&(0x7f0000c86f88)={0x5, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0xff, 0x0, 0x0, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6b2249a6, 0x83}, 0x0, 0x400, 0x40, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xc) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000000)) 04:18:36 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) personality(0x5000007) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:36 executing program 0: ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, 0x3, [@null, @bcast, @bcast, @bcast, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 329.735752] audit: type=1800 audit(1570076316.549:238): pid=14417 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17112 res=0 04:18:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400140, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6, @default, @rose={'rose', 0x0}, 0x0, [@bcast, @null, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null]}) read(r0, &(0x7f00000002c0)=""/117, 0x75) sendto(r1, &(0x7f00000000c0)="69061e963db4621d2b3411ab437280d7bbc4aa51a98ae87c9dcdeea83d0229bbddc6fde5143a020aa0719891b33d20d80b6cf9be033a2cec69436a125f8c83a5543c42f8adc357278e81361d288d5236b768fe3a94d406fe24b6566e78c0857d75e78d394469fb4f50936dfa9425b140bc98efabdaca4a30daa94a0c93846413e7a64e803509eba677806f35ad835d4517a5003523bf8384a13231e1ee79dfcc9a605b945e420e7bf9775ac46be63e2dc8e0a6b32fba98157ed152a08a76501de45493eb058e9d1818e7aee1842ed3f914", 0xd1, 0x4001, &(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @my=0x0}, 0x80) 04:18:36 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x28a, 0xfa00, {0x4, &(0x7f0000000040), 0x106, 0x6}}, 0xffffffffffffff06) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f00000002c0)=""/117, 0x75) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) 04:18:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x1000) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x2) 04:18:36 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r2, 0xc00000c0045005, &(0x7f0000000180)=0x80) write$nbd(r2, &(0x7f0000000040)=ANY=[@ANYRES64], 0x1) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, 0x0) poll(&(0x7f0000000340)=[{r3, 0x95bdcc05a542056}, {r0, 0x40}, {r4, 0x100}], 0x3, 0xffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000180)={0xff, 0x7, 0x2, {0x0, 0x1c9c380}, 0x2, 0x3}) r5 = dup(0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000140)=0x16) 04:18:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:37 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0xfffc) 04:18:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x40000, 0x54) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000580)="f2af8e7cb19567f52565d6e7237bde2e52edadddb66b189382f9728bdd5243034e38de6523a400d37776bab20f4cccd43aa453d1cf4cd3074925f44cf384ab699d39167bd46fd6f9dc05fc2126e10780dec3d4114e644f344be3031645c5d5f19ca85d03b5e7aa94a8397ea470ff43be6b6c58", 0x73) r2 = socket(0x22, 0x2, 0x4) bind$isdn_base(r2, &(0x7f0000000040), 0x6) r3 = dup(0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) r4 = socket(0x22, 0x2, 0x4) bind$isdn_base(r4, &(0x7f0000000040), 0x6) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000000)=0x2800, 0x4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000940)={'L-', 0x8}, 0x28, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_RESET(r5, 0xc0045878, 0x0) sendmsg(r2, &(0x7f0000000280)={&(0x7f0000000100)=@tipc=@name={0x1e, 0x2, 0x1, {{0x0, 0x3}, 0x3}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000180)="7f0ccc5adab05cbc4bb90b43f43d9f9558f4e1e2163b1e7a6f", 0x19}, {&(0x7f00000001c0)="bffe9c9835a1a349d665396740c107d1be40f955b271ad92470283e531ca045e972dc4b42bc288c304cc9d0b9d57386044717c2d2c5872dfe12ec570dfd415f8526687accf39a8c9107096cb4a27f5a8c9b4e03fcc8acd452cd5a9643add", 0x5e}, {&(0x7f0000000340)="fed13a9d28e1f50d34f44be8a7e36a3442c5a2f764204560e62b6bd9310a67ffa41e482c82dd445cf055a329fc4c8af80c0c9780ab3d7e6179d73fd67f32dc88707cadcc5d294d16f8b646ddfae5e00bc72b487714b5de3953d81dfb9410fac8bb2526e136af8a6e08667a70d79d98f8a18cdf2ea64506f23456310f87f27a6397ee748d146304af62ba382a0acdfe41b9b94282c810f2e13dc337", 0x9b}, {&(0x7f0000000240)="5960d3cdc63c4e6e457da38bbf085d27c0228c82ffb359e8fd11f7104836b37740d8eb4dc8d0c2ca25c29ef22c6ea602c9e93aa330f2c8ba", 0x38}, {&(0x7f0000000400)="a072fc4aedcd667d952f9711f9b06cb22d7cc2d58068315f075d27a2208ae9e15bbf1de42e6c5463ce631681862d51c579047a151e136db3f500e31ce32073786e71b40f95b82c7a633e90aa0fdb939a74a36f27b1dd6ef54366d175e1a2983950c24539816246a06f7fc3e06300f70f03eef8876134dc548fe3a1caca2397357c236334a2b5259318e88a8a2c57dc495f58bbd5ebc793bd8075279e1be6689c9eab45fee6c19731f11eb8a551b939fca980a3b88c6341075bf3e4eed9ff794f63987bedf395406647d8f504ff00550bbdca7835f06672052084e292f8b37b4e3ee3b05ba1d4e10925b865d0388a714b", 0xf0}, {&(0x7f0000000700)="81c8739c921c58106c7c67a9765f57c4ed2600285654233cbf2295700aadec2c088de10b0612ed2379f40fec8b2d9ccb8e343f67cdf83dfecbecf6f023499c8125b5edac4eb881d4c413ce30d4aaabce7e73b541316821c26be0e7ec11830cc8ec6fd929a8a88f970289f00a590b5477851f0344f6a112a07a3ef2132f059aea3be14a1726df3c0991268fd6a0743dcc6f73fd33ae8f2c0b82c0d7588b8165cb479ed7f7ea35104caad08c3d07b53889c63deb6cb206adf704e277d7be40c8a79288dfcea3c871c9f624b232113c7fffd59514d3beb428500d3cf0f83095", 0xde}], 0x6, &(0x7f0000000800)=[{0xc8, 0x1d, 0x5, "5e8930b821982b01bb911c67bbe1c8afba4df399766de9535eaad72abec87c61fdd0fb2c0b8a06a96c73712bc964af8a6192ec67bae299d6eb4cb104d233423fc06562edb5d8cd4f3c91be71b2774a35faf34e56cce9ccab96e6c8fded016c7f4ff8668ed9fa1689439eead66d22001952d1485cf0e5615bea7d2c8fd88d848056b6b9d657bed840a190b3f5a237d6cd29f8ee51634b53c8b5c00528d46fef237f19a835ade689f6bd90bf785550a5ee52ea82e1b128ae73"}, {0x70, 0x10a, 0x1ffc00, "29c6ba5c866427b2aa24603aa3abe0b018d722d9a77bb12880850128f4ce7f3e228c522cf61bc235ff3406610a726962a155f31b31d3267553f9753516f392755539491901bf81b386e48e4a51c375a20d529fd67785035a8d0e"}], 0x138}, 0x8c00) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000080)) 04:18:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x6, 0x2}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = dup(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000040)={&(0x7f0000000000)=[0x9a4, 0x6, 0xfffffff9, 0x401, 0x6], 0x5, 0x0, 0x3, 0x1ff, 0x3f, 0x401, {0x800, 0x20, 0x7, 0x3f, 0x7, 0x8, 0x1, 0x1000, 0x2ed8, 0x400, 0xf31, 0x5, 0x4, 0x2d98620e, "5c07112ec41767e889774686166382dab7e9ff0f7a3430ca78e538707a7b250f"}}) 04:18:37 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0xfffc) 04:18:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x2c3, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7a}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000000)='system\x00', 0x7) r2 = socket(0x22, 0x2, 0x4) bind$isdn_base(r2, &(0x7f0000000040), 0x6) accept4$nfc_llcp(r2, &(0x7f0000000040), &(0x7f00000000c0)=0x60, 0x800) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000040)=0x3) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0), 0xc4000) read(r1, &(0x7f00000002c0)=""/117, 0x75) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000080)={0x7ff, 0x7, 0x200, 0x60, 'syz0\x00', 0x9}) 04:18:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:37 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0xfffc) 04:18:38 executing program 0: r0 = dup(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:38 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffc) 04:18:38 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x8000) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, &(0x7f0000000040)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000040)={{0x0, 0x3575}, 'port0\x00'}) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0x0, 0x0) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') r3 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0xf, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x305200, 0x0) openat(r4, &(0x7f0000000240)='./file2\x00', 0x940, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000140), 0x1) r5 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r5, &(0x7f00000002c0)=""/117, 0x75) 04:18:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:38 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x4, 0x1, 0x1ff, r4}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f00000005c0)={r4, 0x4, 0x3}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140)={r4, 0x7fff, 0x7}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000001c0)={r5}, &(0x7f0000000340)=0x8) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r6 = dup(0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000380)) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:38 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffc) 04:18:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r1, 0xc00000c0045005, &(0x7f0000000180)=0x80) write$nbd(r1, &(0x7f0000000040)=ANY=[@ANYRES64], 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) 04:18:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x401, 0x2}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r2, 0xc00000c0045005, &(0x7f0000000180)=0x80) write$nbd(r2, &(0x7f0000000040)=ANY=[@ANYRES64], 0x1) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000180)={0x1, [0x1]}) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000000000000218c0000050000000000000000000000d9000000090000000000000000000000000000000086000000010000000000000000000000020000000000000008000000000000009f000000000010000300000007000000"]) syncfs(r0) 04:18:38 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffc) [ 331.744173] overlayfs: filesystem on './file0' not supported as upperdir 04:18:38 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x0) 04:18:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:38 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x0) 04:18:38 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x0) 04:18:38 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x8000) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, &(0x7f0000000040)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000040)={{0x0, 0x3575}, 'port0\x00'}) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0x0, 0x0) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') r3 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0xf, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x305200, 0x0) openat(r4, &(0x7f0000000240)='./file2\x00', 0x940, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000140), 0x1) r5 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r5, &(0x7f00000002c0)=""/117, 0x75) 04:18:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) [ 332.273735] FAT-fs (loop5): bogus number of reserved sectors [ 332.290425] FAT-fs (loop5): Can't find a valid FAT filesystem 04:18:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:39 executing program 2: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0x4000) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x286900) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000000c0)={r3, 0x1}) read(r0, &(0x7f00000002c0)=""/117, 0x75) r4 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r4, 0xae9a) ioctl$VIDIOC_SUBDEV_G_EDID(r4, 0xc0285628, &(0x7f0000000180)={0x0, 0xd6, 0x1, [], &(0x7f0000000140)=0x74}) write$P9_RAUTH(r1, &(0x7f00000001c0)={0x14, 0x67, 0x1, {0xe4857fb8d2e3a638, 0x3}}, 0x14) r5 = socket(0x22, 0x2, 0x4) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) fcntl$getownex(r6, 0x10, &(0x7f0000000240)) bind$isdn_base(r5, &(0x7f0000000040), 0x6) ioctl$SIOCGSTAMPNS(r5, 0x8907, &(0x7f0000000100)) 04:18:39 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x8000) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, &(0x7f0000000040)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000040)={{0x0, 0x3575}, 'port0\x00'}) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0x0, 0x0) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') r3 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0xf, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x305200, 0x0) openat(r4, &(0x7f0000000240)='./file2\x00', 0x940, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000140), 0x1) r5 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r5, &(0x7f00000002c0)=""/117, 0x75) 04:18:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:39 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cXy\n\xedp\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:39 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x80000000, 0x488887) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x2, &(0x7f0000000540)=[{}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f00000005c0)={r3}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000040)={r3, &(0x7f0000000340)=""/4096}) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20180}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x18, 0x0, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x44040850}, 0x80) [ 332.942603] Unknown ioctl 44640 [ 333.030489] Unknown ioctl 44640 04:18:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x670000) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {0xfff, 0x1, 0x200, 0x8}, 0x20, [0x101, 0x4, 0x6122, 0x9, 0x3, 0x1, 0x0, 0x8, 0xfffffff8, 0x5, 0xaf, 0x7, 0x2, 0x9, 0x7fffffff, 0x10000, 0x7ff, 0x0, 0x3d, 0x10000, 0x1, 0x9, 0x7fff, 0x7ff, 0xffff5295, 0x7f, 0x6, 0xe11, 0x800, 0x0, 0x20, 0x1, 0x2, 0x1, 0x9, 0x9, 0x6, 0x10000, 0x4, 0x4, 0x3, 0x3ff, 0xe0000000, 0xb815, 0x4, 0xffffff3e, 0x20, 0x6, 0x3, 0xfffffe1e, 0x8, 0xff, 0xffffffe1, 0x4b86, 0x9, 0x0, 0x0, 0x5, 0xe34, 0x9, 0x400, 0x8, 0x7, 0x9], [0x3ff, 0x8000, 0x8, 0x5, 0x1, 0x6, 0xfffffffe, 0x6, 0x2, 0x1, 0x10001, 0x6, 0x80, 0x7, 0x2, 0x6, 0x47, 0x87d, 0x9, 0x5, 0x2a2d, 0x1f, 0x7, 0x10001, 0xfffffffb, 0x4, 0x80000000, 0x7, 0x7ff, 0x400, 0x3, 0x7f, 0x6, 0xffff7fff, 0x0, 0x10000, 0x0, 0x8, 0x7fffffff, 0x10000, 0x20, 0x10000, 0x1, 0x6, 0x2, 0x3, 0x5, 0x5, 0xffffffff, 0x5, 0x8, 0x3f, 0x9, 0x3ff, 0x3, 0x5, 0x80, 0x5, 0x8, 0x8001, 0xfa, 0x8, 0x401, 0x514], [0x1, 0xb5, 0x5, 0x0, 0x3, 0x1, 0x0, 0x0, 0x80, 0x80000001, 0x6, 0x48000, 0x10001, 0x253, 0x0, 0x4, 0x3f, 0x0, 0x3, 0x401, 0x100, 0x4, 0x0, 0x6, 0x2, 0x8, 0x3, 0x8000, 0x4f36, 0x6, 0x8, 0x20, 0x5, 0x7, 0x0, 0xc2, 0x40, 0x1b3, 0xffffffff, 0x8, 0x8, 0x3, 0x6, 0xfffffffe, 0x9, 0x2c, 0x0, 0x3, 0x80000000, 0x1, 0x8, 0x9, 0x2, 0x93a, 0x2, 0x7, 0x3, 0x7fffffff, 0x7, 0x1, 0x7, 0x4, 0x102, 0x248227ee], [0x7, 0x9, 0x7, 0x6, 0x10000, 0x401, 0xfffffffd, 0x8001, 0x3ff, 0x1, 0x6, 0x80000001, 0x1000, 0x7fff, 0x3, 0x9, 0x5, 0x5, 0x8, 0xfffffffa, 0x1, 0x7, 0x4, 0x81, 0x8, 0x5, 0x401, 0x9fc, 0x9, 0x34, 0xf22, 0x81, 0x1, 0x7, 0x5, 0x10000, 0x7a, 0x2, 0x7, 0x3, 0x0, 0x4, 0x4, 0x0, 0x2ea3, 0x1e, 0x2, 0x1, 0x10001, 0x8, 0x0, 0x0, 0x20, 0x819c, 0x6, 0x2, 0xfffffff8, 0xc3, 0x1f, 0x101, 0x2, 0x6fe, 0x1, 0x7f]}, 0x45c) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="8ae4083f9e7e4f52206185607a7af7e5a3ef65e2d5d60f8e79b844014f4f2f081121f65b49f5b6110f4a1271b91f5fec0f72eedab1eddabcd3c9e639330d84341fcd56b815086102491114173819d14c33dd2f3083f1f2d4604aff2926fa1ed5ccdd9bd639cb6074c1a39abff3949db34fe93ade6877652d1d6f73a96c1f822c8da91af45e92b592f7afbc551f6ce5623fbbd4060477daf4322c5e5b3c1940604ae34e1fd34a6a660b3953e206dc9b1b8b9e9576c955f7eba9b9cc41b3e9030647", 0xc1, 0x24004850, &(0x7f0000000140)={0x2, 0x4e22, @multicast2}, 0x10) 04:18:39 executing program 0: syz_open_dev$char_usb(0xc, 0xb4, 0x3) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20, 0x0, 0x8, {0x2, 0x4, 0xffff0000, 0x4}}, 0x20) 04:18:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) r3 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x2, 0x4200) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="030000000002fbfb"], 0x8) ioctl$KVM_NMI(r2, 0xae9a) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000000)=0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f00000005c0)={0x2, &(0x7f00000003c0)=""/231, &(0x7f0000000280)=[{0x8, 0xd9, 0x80000001, &(0x7f00000004c0)=""/217}, {0xc915, 0x8, 0x401, &(0x7f0000000240)=""/8}]}) r6 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) read(r6, &(0x7f00000002c0)=""/117, 0x75) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) read(r1, &(0x7f00000002c0)=""/117, 0x75) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000040)) 04:18:40 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r0) read(r1, &(0x7f0000000400)=""/163, 0xa3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000180)={0x11, 0x2, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000580)=""/245) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x6, 0x70, 0xfffffffffffffffd, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8000}, 0x3030, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x800) r1 = socket(0x22, 0x2, 0x4) bind$isdn_base(r1, &(0x7f0000000040), 0x6) r2 = socket(0x22, 0x2, 0x4) bind$isdn_base(r2, &(0x7f0000000040), 0x6) r3 = socket(0x22, 0x2, 0x4) bind$isdn_base(r3, &(0x7f0000000040), 0x6) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x4, 0x4) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:40 executing program 2: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x22, 0x2, 0x4) bind$isdn_base(r2, &(0x7f0000000040), 0x6) r3 = accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000080)={{0x2, 0x4e22, @local}, {0x306, @broadcast}, 0xb4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}, 'caif0\x00'}) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:40 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_CAPBSET_DROP(0x18, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendfile(r0, r2, &(0x7f0000000000), 0x0) r3 = getpid() kcmp$KCMP_EPOLL_TFD(r3, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) getpgid(r3) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) r1 = syz_open_dev$swradio(&(0x7f0000000380)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e23, @local}}, [0x4d, 0x4, 0x1000, 0xffffffff, 0x8, 0x7, 0x0, 0x7, 0x5, 0xb8d, 0x7fff, 0x1, 0x2, 0x5, 0x5]}, &(0x7f0000000540)=0x100) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000580)={r2, @in={{0x2, 0x4e20, @remote}}, 0x3, 0x4}, 0x90) bind$isdn_base(r0, &(0x7f0000000040), 0x6) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000000)=0x4, 0x4) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) r4 = socket$inet(0x10, 0x2, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r8}}, 0x24}}, 0x0) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000001c0)={r8, 0x1, 0x6, @dev={[], 0x1d}}, 0x10) r9 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r9, &(0x7f00000002c0)=""/117, 0x75) r10 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/mixer\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r10, 0x84, 0x16, &(0x7f0000000680)={0x3, [0x101, 0x2, 0xcada]}, &(0x7f00000006c0)=0xa) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) 04:18:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8) 04:18:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed5039478d61a9b484b597fc35036cf6e12bb0c2123c3e0c96a24d9feabd"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x301044, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000340)={0x0, 0x0, 0x2080}) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:40 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40040, 0x0) write$P9_RREAD(r0, &(0x7f0000000240)={0x6e, 0x75, 0x1, {0x63, "f4748fc8dda3531515bc392c19dfbc71dc89cab83ebd8ed424ec0b9392d0f110c71d612c34b7e1690ee4f7e30c5812741a129ecb660d65c49c3e0f16aeccc7396ade27dd423c33078f510e22c21d67578c70984d6f6d6df307f9e3694bc4e52e68d455"}}, 0x6e) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x22, 0x2, 0x4) bind$isdn_base(r2, &(0x7f0000000040), 0x6) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r4, @ANYBLOB="c52f000000000000002c06000000259e011a"], 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x60000008}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x100, r4, 0xb0c, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x47}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd476}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x90}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x110}, 0x4) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x88200, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000040)={{0x10000, 0x6000, 0xb, 0x6e, 0x5, 0x5, 0x7f, 0x0, 0x77, 0x80, 0x5, 0xf9}, {0x10000, 0x2000, 0x3, 0x97, 0x0, 0x1f, 0x5, 0x4, 0x7f, 0xf8}, {0x2, 0xf000, 0x0, 0x20, 0x5, 0x7, 0x1, 0xff, 0x6, 0x1, 0x80, 0x5}, {0x2000, 0xd000, 0x10, 0x1, 0x81, 0x5, 0x20, 0x80, 0x80, 0x4, 0x3, 0x40}, {0x2000, 0x10000, 0x13, 0x81, 0xfc, 0x7, 0x1, 0x8, 0x81, 0x0, 0x6, 0x1}, {0x4000, 0x3000, 0xb, 0x1f, 0xff, 0x0, 0x4f, 0xdb, 0x3, 0x6, 0x0, 0x20}, {0x2000, 0x4, 0x8, 0x25, 0x8f, 0x40, 0xff, 0x9, 0xb0, 0x9, 0xf8, 0x4}, {0x100000, 0xd000, 0x0, 0x1, 0x4, 0x7, 0x7, 0x7, 0x8c, 0x8, 0x0, 0x1f}, {0x8000, 0x4}, {0xf7fe164c901bc9a2, 0x3000}, 0x10061, 0x0, 0x5000, 0x4001, 0xb, 0x4000, 0xd000, [0xe3, 0x2, 0x40, 0x2]}) read(r0, &(0x7f00000002c0)=""/117, 0x75) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x10) 04:18:40 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x22, 0x2, 0x4) bind$isdn_base(r2, &(0x7f0000000040), 0x6) r3 = accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000080)={{0x2, 0x4e22, @local}, {0x306, @broadcast}, 0xb4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}, 'caif0\x00'}) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x6) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x7f, 0x2, 0x9, 0xd7, 0x7}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x3ff, 0x8, 0xd6d, 0x9, r2}, 0x10) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r4, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r4, 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000080)=""/240) ioctl$TIOCGPGRP(r5, 0x540f, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000380)={0x5, 0x8f1, 0x8}) ioctl$UI_BEGIN_FF_ERASE(r5, 0xc00c55ca, &(0x7f0000000180)={0xc, 0x2000006, 0xffffffff}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @raw_data=[0x446, 0x5080000, 0x1, 0x1000, 0xfffffffc, 0x3, 0xf5, 0x9, 0x0, 0x0, 0x0, 0x2, 0xffffffff, 0xff, 0x100, 0x18000000, 0x80000000, 0x7f, 0x3, 0xb10, 0x5, 0x9, 0x5, 0x7, 0x7c, 0xf1ea961, 0x8, 0x5, 0x0, 0x4ec85943, 0x1, 0x7]}) ioctl$int_in(r1, 0xc00000c0045005, &(0x7f0000000180)=0x80) write$nbd(r1, &(0x7f0000000040)=ANY=[@ANYRES64], 0x1) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000000)={0x8001008, 0x9, 0x1}) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:41 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x22, 0x2, 0x4) bind$isdn_base(r2, &(0x7f0000000040), 0x6) r3 = accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000080)={{0x2, 0x4e22, @local}, {0x306, @broadcast}, 0xb4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}, 'caif0\x00'}) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2a000, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) 04:18:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$rxrpc(0x21, 0x2, 0xa) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f00000002c0)=""/117, 0x75) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x400) 04:18:41 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:41 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x22, 0x2, 0x4) bind$isdn_base(r2, &(0x7f0000000040), 0x6) r3 = accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000080)={{0x2, 0x4e22, @local}, {0x306, @broadcast}, 0xb4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}, 'caif0\x00'}) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0xf9, 0x4, 0x0, 0x0, 0x1, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc614, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:41 executing program 3: accept4$tipc(0xffffffffffffffff, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10, 0x800) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x52, 0x9, 0x0, 0x8, 0x1000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7a, 0x1, @perf_config_ext={0x8000, 0xffffffffffff8001}, 0x22020, 0x406fcb4c, 0xbad, 0x9, 0x3, 0x3, 0x6}, r0, 0xf, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x1c0000000000, 0x800) pwrite64(r1, &(0x7f0000001340)="64492d139140796fbcd68d71af166b1484dd26716197505b03ce0e6dd11bf0c95c585c1309461d8da1cddf99c04529bea799ba1696005f237b6a6fdc237d975c5acfe5a54d698c8d9b0e4b03cad3554a5f587139dc23162e0e317222121d91a8df2b9e3f72334dc8967de8d843f31cebbf223f3b00394c3c625632bc7ab9529b09dce9da0c9b2ac72fca470a7782b671bc3ec91892ad835cb79b6fe453369b5ae094bda09173e5", 0xa7, 0x0) pread64(r2, &(0x7f0000000340)=""/4096, 0x1000, 0x5) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x22, 0x2, 0x4) bind$isdn_base(r4, &(0x7f0000000040), 0x6) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000180)={0x0, 0xffffffff}, &(0x7f00000001c0)=0x8) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000001400)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000240)={r5, 0x1, 0x9, [0x9, 0x5, 0x6, 0x5, 0x100, 0x0, 0x0, 0x400, 0x1]}, &(0x7f0000000280)=0x1a) fgetxattr(r1, &(0x7f0000001440)=@known='system.advise\x00', &(0x7f0000001480)=""/202, 0xca) read(r3, &(0x7f00000002c0)=""/117, 0x75) 04:18:41 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x22, 0x2, 0x4) bind$isdn_base(r1, &(0x7f0000000040), 0x6) r2 = accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000080)={{0x2, 0x4e22, @local}, {0x306, @broadcast}, 0xb4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}, 'caif0\x00'}) 04:18:41 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000580)="df9675a8a71c32e17f9cb8d0fc24200d414b7941a0c722a7d324876e26d7f577da142278b4f59cdce1af6c77fd7a7945e8cbb7e5315ed7ef093bc7e17520c62fcdcd047c560d28150e5630c57fd4a753b500881e146b50946742e324ed49e407c9678019a95fa1e2286f7f4eb7dc3800044b1273848680910cfa718c2eb0c34b14d25d2ac915103139a3756d511ef0e69856ac5f30e5a8e3eab5802ddda31193a6c7a057fa65ac68f6fede30c9426d07c452e553484b1989d36cca9dd9e93cb678959e6d5dfb841b498cbd88e62f6791e98c18884f1c4dc7078b6f60e3a981c5c6653036ccb6a03069524e108c") bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:41 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) capset(&(0x7f0000000040)={0x20071026, r0}, &(0x7f0000000080)={0x9, 0xff, 0x5, 0x401, 0x8, 0x9}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x4, 0x8002) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xfffffffffffffffe) 04:18:42 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x22, 0x2, 0x4) bind$isdn_base(r1, &(0x7f0000000040), 0x6) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:42 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000140)={{0x2b, @local, 0x4e23, 0x2, 'sed\x00', 0x20, 0x20, 0x69}, {@multicast2, 0x4e23, 0x3, 0x400, 0x2, 0xd3}}, 0x44) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000400)='westwood\x00', 0xfffffef6) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:42 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r0, 0xc00000c0045005, &(0x7f0000000180)=0x80) write$nbd(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x1) openat(r0, &(0x7f0000000040)='./file0\x00', 0x710042, 0x3) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) connect$bt_sco(r3, &(0x7f0000000080)={0x1f, {0x6, 0x8, 0xf, 0x0, 0xac, 0x8}}, 0x8) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000000)=""/23) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:42 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x4000, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:42 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x22, 0x2, 0x4) bind$isdn_base(r1, &(0x7f0000000040), 0x6) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:42 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x22, 0x2, 0x4) bind$isdn_base(r1, &(0x7f0000000040), 0x6) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20, 0x0, 0x6, {0xff, 0x2, 0x1}}, 0x20) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:42 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) getpeername$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000800)=0x14) r4 = dup(0xffffffffffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r5}}]}) sendmsg$nl_xfrm(r2, &(0x7f0000001a00)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2040020}, 0xc, &(0x7f00000019c0)={&(0x7f0000000840)=@delpolicy={0x1144, 0x14, 0x4, 0x70bd28, 0x25dfdbff, {{@in=@empty, @in6=@dev={0xfe, 0x80, [], 0x19}, 0x4e24, 0x3, 0x4e24, 0x5, 0x2, 0x0, 0x100, 0x67, r3, r5}, 0x6e6bb5, 0x5476965d617ec14f}, [@algo_comp={0x1048, 0x3, {{'lzs\x00'}, 0x8000, "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"}}, @tmpl={0x84, 0x5, [{{@in6=@rand_addr="5da912f16cd360c4103afea39124241f", 0x4d2, 0x25}, 0x2, @in6=@local, 0x3504, 0x2, 0x1, 0x2, 0x1, 0x6, 0xff80}, {{@in6=@local, 0x4d4, 0x6c}, 0xa, @in=@broadcast, 0x3507, 0x0, 0x0, 0x82, 0x81, 0x9, 0x1}]}, @output_mark={0x8, 0x1d, 0x100}, @output_mark={0x8, 0x1d, 0x6}, @lastused={0xc, 0xf, 0x7fffffff}, @mark={0xc, 0x15, {0x35075a, 0x2}}]}, 0x1144}}, 0x4000) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) fcntl$setsig(r6, 0xa, 0x34) socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x80000000) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:42 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x22, 0x2, 0x4) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) syz_init_net_socket$rose(0xb, 0x5, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:18:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = getpid() ptrace$setopts(0x4200, r1, 0x2, 0x28) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000040)=0x4) 04:18:42 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x21d, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xb08, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:43 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x5, 0x100000000, 0x8, 0x37}) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed5039478d61a9b484b597fc35036cf6e12bb0c2123c3e0c96a24d9feabd"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:43 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0xffffffffffffff20, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f00000000c0)) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r4, 0x800, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0xffffffffffffffba}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$KVM_NMI(r1, 0xae9a) write$P9_RWSTAT(r1, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7) 04:18:43 executing program 3: r0 = dup(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r1}}]}) r2 = getgid() lchown(&(0x7f0000000040)='./file0\x00', r1, r2) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)={0x0, 0x0}) r5 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0xa3}}, r4, 0x0, 0xffffffffffffffff, 0x1) read(r5, &(0x7f00000002c0)=""/117, 0x75) 04:18:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) syncfs(r0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x207100, 0x0) 04:18:43 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:43 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x22, 0x2, 0x4) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x5) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000000000000320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d4e88538cb68e5f4000000000000000000"]) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f00000002c0)=""/117, 0x75) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) faccessat(r4, &(0x7f0000000100)='./file0\x00', 0x1d, 0x800) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="f8000000160017030000000000000000ff010000000000000000000000000001e000000200"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000aa0000000032000000fe8000000000000000000000000000bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000"], 0xf8}}, 0x0) fcntl$dupfd(r5, 0x406, r2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000080)={0x3}, 0x1) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r7, 0x10e, 0xa, &(0x7f0000000180)=0x80, 0x4) sendmsg$nl_xfrm(r3, &(0x7f00000003c0)={0x0, 0x20c, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x4e24}, {@in6=@local, 0x0, 0x32}, @in=@loopback}, 0x0, 0x8}}, 0xf8}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) dup3(r3, r6, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r9 = dup(0xffffffffffffffff) ioctl$UFFDIO_WAKE(r9, 0x8010aa02, &(0x7f00000001c0)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) ioctl$sock_TIOCOUTQ(r8, 0x5411, &(0x7f0000000140)) 04:18:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:43 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r1, 0xc00000c0045005, &(0x7f0000000180)=0x80) write$nbd(r1, &(0x7f0000000040)=ANY=[@ANYRES64], 0x1) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000580)={0x80000000, 0x4, "6c32715e845a353550c4e61f27b45adfe5ef8832330afdfacc1daef1d834fa52", 0xff, 0x0, 0x100000001, 0x800, 0x8, 0x6, 0x4, 0xfffffffb, [0x8, 0x1000, 0x80000001, 0x3]}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r2, 0xae9a) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000140)=0xfffffffb) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:43 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) r1 = socket(0x22, 0x2, 0x4) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:43 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) r1 = socket(0x22, 0x2, 0x4) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10422, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:44 executing program 1: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) r1 = socket(0x22, 0x2, 0x4) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x200, 0x4) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7ff}}, 0x8, 0x5}, &(0x7f0000000100)=0x90) 04:18:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x200000000d8, 0x0, 0x0, 0x18, 0x0, 0x0, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f00000001c0)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}}) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000080)=""/240) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0xdf81b8b2c2235e7f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r2, r3, 0x3, 0x2}, 0x10) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x401080) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:18:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:44 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_config_ext={0x9}, 0x4, 0x10, 0x0, 0x7, 0x100000000}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getpgrp(r1) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000100)={0x1f, {0xaa, 0x5, 0x9, 0x0, 0x85, 0x22}}, 0x8) r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 04:18:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:18:44 executing program 0: r0 = dup(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x6) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104c6, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x98080, 0x0) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f00000001c0)={0x4, 0x8, 0x3, {0x7, @win={{0x5dc5, 0xe00, 0x9, 0x1ff}, 0xc72b53676fc3cc2c, 0x20, &(0x7f00000000c0)={{0x9, 0x80b, 0x3d2, 0x8f}, &(0x7f0000000080)={{0x0, 0x10000, 0x3, 0x4000000}, &(0x7f0000000040)={{0x10001, 0x81, 0x8, 0x6}}}}, 0x9, &(0x7f0000000100)="a2db8959577f18614c49cb76033eaf6c8db99cf922814ab28d7a4a7692ed3c75f53b265f597c064863406624bb25a8a227058ffbb294b6dc19ddba49e55a5ad97b6480ebd897a723282580cedc08edbc35ad61ce24b991cac35115b7e1397f1fb931d2aa4b903c28d0452c8984800d908f3f97bf03fa34cffb5580e63c002876b068c680e3ab0895f8d9c81e83dea1f3ef3b80db6260179a", 0x1f}}}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) ftruncate(r3, 0x7) 04:18:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x144, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffe1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa70}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x43}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffff57}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x800}, 0x40830) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:18:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed5039478d61a9b484b597fc35036cf6e12bb0c2123c3e0c96a24d9feabd"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r7 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r7, &(0x7f0000000640), 0x12) 04:18:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe80, 0x3f00, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa29a16f291d36a48e93100ffff81", 0x0, 0x100, 0xf2ffffff}, 0x28) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:44 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) r1 = socket(0x22, 0x2, 0x4) bind$isdn_base(r1, &(0x7f0000000040), 0x6) ppoll(&(0x7f0000000140)=[{r1, 0x60a0}], 0x1, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000340)=""/111, 0x6f}, {&(0x7f0000000400)=""/184, 0xb8}, {&(0x7f0000000580)=""/99, 0x63}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x4) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0x4, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 337.925596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15004 comm=syz-executor.3 [ 337.972872] [ 337.974548] ====================================================== [ 337.980862] WARNING: possible circular locking dependency detected [ 337.987295] 4.14.146 #0 Not tainted [ 337.990373] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 337.990955] ------------------------------------------------------ [ 337.999419] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 338.005980] syz-executor.2/15009 is trying to acquire lock: 04:18:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 338.005984] (&event->child_mutex){+.+.}, at: [] perf_read+0x2c0/0x820 [ 338.006003] [ 338.006003] but task is already holding lock: [ 338.006004] (&cpuctx_mutex){+.+.}, at: [] perf_event_ctx_lock_nested+0x150/0x2c0 [ 338.006015] [ 338.006015] which lock already depends on the new lock. [ 338.006015] [ 338.006017] [ 338.006017] the existing dependency chain (in reverse order) is: [ 338.006019] [ 338.006019] -> #5 (&cpuctx_mutex){+.+.}: [ 338.006034] lock_acquire+0x16f/0x430 [ 338.006041] __mutex_lock+0xe8/0x1470 [ 338.006046] mutex_lock_nested+0x16/0x20 [ 338.006053] perf_event_init_cpu+0xc2/0x170 [ 338.006064] perf_event_init+0x2d8/0x31a [ 338.047089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15004 comm=syz-executor.3 [ 338.055137] start_kernel+0x3b6/0x6fd [ 338.055145] x86_64_start_reservations+0x29/0x2b [ 338.055151] x86_64_start_kernel+0x77/0x7b [ 338.055160] secondary_startup_64+0xa5/0xb0 [ 338.055163] [ 338.055163] -> #4 (pmus_lock){+.+.}: [ 338.055180] lock_acquire+0x16f/0x430 [ 338.055186] __mutex_lock+0xe8/0x1470 [ 338.055190] mutex_lock_nested+0x16/0x20 [ 338.055198] perf_event_init_cpu+0x2f/0x170 [ 338.055205] cpuhp_invoke_callback+0x1ea/0x1ab0 [ 338.055210] _cpu_up+0x228/0x530 [ 338.055214] do_cpu_up+0x121/0x150 [ 338.055219] cpu_up+0x1b/0x20 [ 338.055226] smp_init+0x157/0x170 [ 338.055237] kernel_init_freeable+0x30b/0x532 04:18:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x9, &(0x7f0000ffd000/0x2000)=nil, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, 0x0, 0x0) r3 = dup2(r2, r0) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000080)=0x4) [ 338.055245] kernel_init+0x12/0x162 [ 338.055250] ret_from_fork+0x24/0x30 [ 338.055262] [ 338.055262] -> #3 [ 338.084169] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 338.086623] (cpu_hotplug_lock.rw_sem){++++}: [ 338.086646] lock_acquire+0x16f/0x430 [ 338.086654] cpus_read_lock+0x3d/0xc0 [ 338.086664] static_key_slow_inc+0x13/0x30 [ 338.108370] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:18:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 338.108755] tracepoint_probe_register_prio+0x4d6/0x6d0 [ 338.138099] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env [ 338.142656] tracepoint_probe_register+0x2b/0x40 [ 338.142665] trace_event_reg+0x277/0x330 [ 338.142672] perf_trace_init+0x449/0xaa0 [ 338.142679] perf_tp_event_init+0x7d/0xf0 [ 338.142685] perf_try_init_event+0x164/0x200 [ 338.142690] perf_event_alloc.part.0+0xd90/0x25b0 [ 338.142697] SYSC_perf_event_open+0xad1/0x2690 [ 338.142703] SyS_perf_event_open+0x34/0x40 [ 338.142712] do_syscall_64+0x1e8/0x640 [ 338.142722] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 338.142724] [ 338.142724] -> #2 ( [ 338.170388] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 338.173322] tracepoints_mutex){+.+.}: [ 338.173343] lock_acquire+0x16f/0x430 [ 338.173351] __mutex_lock+0xe8/0x1470 [ 338.173359] mutex_lock_nested+0x16/0x20 [ 338.183672] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 338.185257] tracepoint_probe_register_prio+0x36/0x6d0 [ 338.185265] tracepoint_probe_register+0x2b/0x40 [ 338.185272] trace_event_reg+0x277/0x330 [ 338.185282] perf_trace_init+0x449/0xaa0 [ 338.229730] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 338.232552] perf_tp_event_init+0x7d/0xf0 [ 338.232558] perf_try_init_event+0x164/0x200 [ 338.232564] perf_event_alloc.part.0+0xd90/0x25b0 [ 338.232572] SYSC_perf_event_open+0xad1/0x2690 [ 338.232579] SyS_perf_event_open+0x34/0x40 [ 338.232588] do_syscall_64+0x1e8/0x640 [ 338.232597] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 338.232601] [ 338.232601] -> #1 (event_mutex){+.+.}: [ 338.232617] lock_acquire+0x16f/0x430 [ 338.232623] __mutex_lock+0xe8/0x1470 [ 338.232632] mutex_lock_nested+0x16/0x20 [ 338.264298] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 338.267171] perf_trace_destroy+0x28/0x100 [ 338.267181] tp_perf_event_destroy+0x16/0x20 [ 338.267191] _free_event+0x330/0xe70 [ 338.305022] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 338.307742] free_event+0x38/0x50 [ 338.307750] perf_event_release_kernel+0x364/0x880 [ 338.307755] perf_release+0x37/0x50 [ 338.307768] __fput+0x275/0x7a0 [ 338.343604] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 338.349984] ____fput+0x16/0x20 [ 338.349996] task_work_run+0x114/0x190 [ 338.350004] exit_to_usermode_loop+0x1da/0x220 [ 338.350010] do_syscall_64+0x4bc/0x640 [ 338.350019] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 338.350022] [ 338.350022] -> #0 (&event->child_mutex){+.+.}: [ 338.350037] __lock_acquire+0x2cb3/0x4620 [ 338.350044] lock_acquire+0x16f/0x430 [ 338.350049] __mutex_lock+0xe8/0x1470 [ 338.350058] mutex_lock_nested+0x16/0x20 [ 338.383929] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 338.384950] perf_read+0x2c0/0x820 [ 338.384960] __vfs_read+0x105/0x6a0 [ 338.384967] vfs_read+0x137/0x350 [ 338.384977] SyS_read+0xfd/0x230 [ 338.497047] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 338.499976] do_syscall_64+0x1e8/0x640 [ 338.499988] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 338.499991] [ 338.499991] other info that might help us debug this: [ 338.499991] [ 338.499993] Chain exists of: [ 338.499993] &event->child_mutex --> [ 338.511481] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 338.513999] pmus_lock --> &cpuctx_mutex [ 338.513999] [ 338.514007] Possible unsafe locking scenario: [ 338.514007] [ 338.514008] CPU0 CPU1 [ 338.514010] ---- ---- [ 338.514011] lock(&cpuctx_mutex); [ 338.514016] lock(pmus_lock); [ 338.514021] lock(&cpuctx_mutex); [ 338.514025] lock(&event->child_mutex); [ 338.514032] [ 338.514032] *** DEADLOCK *** [ 338.514032] [ 338.514038] 1 lock held by syz-executor.2/15009: [ 338.514040] #0: (&cpuctx_mutex){+.+.} [ 338.565099] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 338.571423] , at: [] perf_event_ctx_lock_nested+0x150/0x2c0 [ 338.571426] [ 338.571426] stack backtrace: [ 338.571437] CPU: 0 PID: 15009 Comm: syz-executor.2 Not tainted 4.14.146 #0 [ 338.571441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.571444] Call Trace: [ 338.571455] dump_stack+0x138/0x197 [ 338.571462] ? vprintk_func+0x65/0x159 [ 338.571472] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 338.571481] __lock_acquire+0x2cb3/0x4620 [ 338.571491] ? unwind_get_return_address+0x61/0xa0 [ 338.571503] ? trace_hardirqs_on+0x10/0x10 [ 338.584378] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env [ 338.587774] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 338.587784] ? kasan_kmalloc+0xce/0xf0 [ 338.587797] lock_acquire+0x16f/0x430 [ 338.587805] ? perf_read+0x2c0/0x820 [ 338.587812] ? perf_read+0x2c0/0x820 [ 338.587824] __mutex_lock+0xe8/0x1470 04:18:45 executing program 1: request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:45 executing program 1: request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) flistxattr(r0, &(0x7f0000000000)=""/191, 0xbf) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r2, 0xc00000c0045005, &(0x7f0000000180)=0x80) write$nbd(r2, &(0x7f0000000040)=ANY=[@ANYRES64], 0x1) r3 = dup(0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r4}}]}) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{}, {0x8, 0x0, r6}, {0x8, 0x0, r6}, {0x8, 0x5}, {}], {0x10, 0x6}}, 0x4c, 0x0) write$FUSE_ATTR(r2, &(0x7f00000000c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x6, 0x1, 0x1, 0x7de9, 0x1, 0x8001, 0x800, 0x3f, 0x8, 0x18d4, 0x1, r4, r6, 0x7, 0x1000}}}, 0x78) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="740100000001000000d4a9e8f986dfb0b1b303117c21d2c6cb94556d9b1cbab925712c4b2749abd9b7955d4968a94711a55754e4f908dcc5e722ccd895d3795ffadcb5a6f2243fc1920040a953a0178f3d3990c3f3c737db3f97cce21818241cdfdd79"]) 04:18:45 executing program 1: request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:45 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', 0x0, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) socket$netlink(0x10, 0x3, 0x0) [ 338.596868] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 338.601887] ? perf_read+0x2c0/0x820 [ 338.601897] ? save_trace+0x290/0x290 [ 338.601904] ? perf_read+0x2c0/0x820 [ 338.601913] ? mutex_trylock+0x1c0/0x1c0 [ 338.601922] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 338.601930] ? rcu_read_lock_sched_held+0x110/0x130 [ 338.601940] ? __kmalloc+0x376/0x7a0 [ 338.601946] ? __lock_is_held+0xb6/0x140 [ 338.601954] mutex_lock_nested+0x16/0x20 [ 338.601960] ? mutex_lock_nested+0x16/0x20 [ 338.601966] perf_read+0x2c0/0x820 [ 338.601974] ? __perf_read_group_add+0x680/0x680 [ 338.601985] ? trace_hardirqs_on+0x10/0x10 [ 338.623593] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 338.627085] ? selinux_is_enabled+0x9/0x50 [ 338.627097] ? creds_are_invalid+0x48/0x110 [ 338.627107] ? fsnotify+0x92f/0x11e0 [ 338.627119] __vfs_read+0x105/0x6a0 [ 338.627128] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 338.627140] ? __perf_read_group_add+0x680/0x680 [ 338.748221] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 338.751910] ? vfs_copy_file_range+0xa40/0xa40 [ 338.751922] ? selinux_file_permission+0x85/0x480 [ 338.751931] ? security_file_permission+0x89/0x1f0 [ 338.751937] ? rw_verify_area+0xea/0x2b0 [ 338.751945] vfs_read+0x137/0x350 [ 338.751954] SyS_read+0xfd/0x230 [ 338.751961] ? kernel_write+0x120/0x120 [ 338.751970] ? do_syscall_64+0x53/0x640 [ 338.751977] ? kernel_write+0x120/0x120 [ 338.751984] do_syscall_64+0x1e8/0x640 [ 338.751994] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.757844] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 338.760969] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 338.760976] RIP: 0033:0x459a29 [ 338.760980] RSP: 002b:00007f280e4edc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 338.760988] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 338.760992] RDX: 0000000000000075 RSI: 00000000200002c0 RDI: 0000000000000005 [ 338.760996] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 338.761000] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f280e4ee6d4 [ 338.761004] R13: 00000000004c5ee2 R14: 00000000004dc880 R15: 00000000ffffffff [ 338.808771] kobject: 'veth310' (ffff888051a2f170): kobject_add_internal: parent: 'net', set: 'devices' [ 338.958890] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env [ 338.965841] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 338.976004] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 338.986910] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 339.041323] kobject: 'veth310' (ffff888051a2f170): kobject_uevent_env [ 339.048267] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 339.056270] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 339.066077] kobject: 'veth310' (ffff888051a2f170): fill_kobj_path: path = '/devices/virtual/net/veth310' [ 339.081520] kobject: 'queues' (ffff8880a06dfd48): kobject_add_internal: parent: 'veth310', set: '' [ 339.099079] kobject: 'queues' (ffff8880a06dfd48): kobject_uevent_env [ 339.105948] kobject: 'queues' (ffff8880a06dfd48): kobject_uevent_env: filter function caused the event to drop! [ 339.118069] kobject: 'rx-0' (ffff88809fbf50d0): kobject_add_internal: parent: 'queues', set: 'queues' [ 339.128151] kobject: 'rx-0' (ffff88809fbf50d0): kobject_uevent_env [ 339.138169] kobject: 'rx-0' (ffff88809fbf50d0): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/rx-0' [ 339.149466] kobject: 'tx-0' (ffff8880800c92d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 339.161010] kobject: 'tx-0' (ffff8880800c92d8): kobject_uevent_env [ 339.167401] kobject: 'tx-0' (ffff8880800c92d8): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/tx-0' [ 339.179413] kobject: 'batman_adv' (ffff8880a19cb100): kobject_add_internal: parent: 'veth310', set: '' [ 339.192697] kobject: 'batman_adv' (ffff8880a19cb100): kobject_uevent_env [ 339.199682] kobject: 'batman_adv' (ffff8880a19cb100): kobject_uevent_env: filter function caused the event to drop! [ 339.218935] kobject: 'batman_adv' (ffff8880a19cb100): kobject_cleanup, parent (null) [ 339.227801] kobject: 'batman_adv' (ffff8880a19cb100): calling ktype release [ 339.236344] kobject: (ffff8880a19cb100): dynamic_kobj_release [ 339.242600] kobject: 'batman_adv': free name [ 339.247754] kobject: 'loop2' (ffff8880a49c81e0): kobject_uevent_env [ 339.255995] kobject: 'rx-0' (ffff88809fbf50d0): kobject_cleanup, parent ffff8880a06dfd48 [ 339.264369] kobject: 'loop2' (ffff8880a49c81e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 339.276672] kobject: 'rx-0' (ffff88809fbf50d0): auto cleanup 'remove' event [ 339.312552] kobject: 'rx-0' (ffff88809fbf50d0): kobject_uevent_env [ 339.318955] kobject: 'rx-0' (ffff88809fbf50d0): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/rx-0' [ 339.337374] kobject: 'rx-0' (ffff88809fbf50d0): auto cleanup kobject_del [ 339.344846] kobject: 'rx-0' (ffff88809fbf50d0): calling ktype release [ 339.353787] kobject: 'rx-0': free name [ 339.357763] kobject: 'tx-0' (ffff8880800c92d8): kobject_cleanup, parent ffff8880a06dfd48 [ 339.366092] kobject: 'tx-0' (ffff8880800c92d8): auto cleanup 'remove' event [ 339.373436] kobject: 'tx-0' (ffff8880800c92d8): kobject_uevent_env [ 339.379785] kobject: 'tx-0' (ffff8880800c92d8): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/tx-0' [ 339.390573] kobject: 'tx-0' (ffff8880800c92d8): auto cleanup kobject_del [ 339.397524] kobject: 'tx-0' (ffff8880800c92d8): calling ktype release [ 339.404850] kobject: 'tx-0': free name [ 339.408765] kobject: 'queues' (ffff8880a06dfd48): kobject_cleanup, parent (null) [ 339.417196] kobject: 'queues' (ffff8880a06dfd48): calling ktype release [ 339.423998] kobject: 'queues' (ffff8880a06dfd48): kset_release [ 339.429966] kobject: 'queues': free name [ 339.434295] kobject: 'veth310' (ffff888051a2f170): kobject_uevent_env [ 339.441316] kobject: 'veth310' (ffff888051a2f170): fill_kobj_path: path = '/devices/virtual/net/veth310' 04:18:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r7 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r7, &(0x7f0000000640), 0x12) 04:18:46 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', 0x0, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5991, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r2, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r2, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000080)=""/240) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)=0x8) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) r4 = socket(0x10, 0x2, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, 0x0, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r4, 0x800443d2, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{}, {}]}) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000000)={0x0, 0x3, 0x1000, 0x3, 0x3, 0x4f0}) 04:18:46 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000140)=0x1) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = getpid() kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) r2 = getpgid(r1) r3 = getpgid(0x0) kcmp(r2, r3, 0x5, r0, r0) [ 339.490365] kobject: 'veth310' (ffff888051a2f170): kobject_cleanup, parent (null) [ 339.498894] kobject: 'veth310' (ffff888051a2f170): calling ktype release [ 339.505786] kobject: 'veth310': free name [ 339.520395] kobject: 'loop4' (ffff8880a4a96b60): kobject_uevent_env [ 339.526870] kobject: 'loop4' (ffff8880a4a96b60): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:18:46 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', 0x0, &(0x7f0000000180)='systemnodev\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 339.550486] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 339.557533] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 339.598273] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env [ 339.605622] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 339.607574] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 339.614648] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 339.622461] kobject: 'veth310' (ffff88805a6b50f0): kobject_add_internal: parent: 'net', set: 'devices' 04:18:46 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000140)="262d462b92f5218ed139de327f0e9b14e1bf562dd458fc122b984df1a6debaf7cb0cfebbcdcbdbbd8b3f7c226811286f0b29593eceed4d37493b70c72dae4ea6d77119c76a552c6b4f126ed9bb3c213edb8aeb7ddacdc474d9508647a4ef8480359bb8f9da233a93ffe22b302e9709f197b67494b4808e1f6f"}, 0x20) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 339.662781] kobject: 'veth310' (ffff88805a6b50f0): kobject_uevent_env [ 339.669613] kobject: 'veth310' (ffff88805a6b50f0): fill_kobj_path: path = '/devices/virtual/net/veth310' [ 339.680499] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 339.680566] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 339.700205] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env 04:18:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 339.710655] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 339.727387] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 339.738090] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 339.739191] kobject: 'queues' (ffff8880a95e3248): kobject_add_internal: parent: 'veth310', set: '' [ 339.765376] kobject: 'queues' (ffff8880a95e3248): kobject_uevent_env [ 339.777011] kobject: 'queues' (ffff8880a95e3248): kobject_uevent_env: filter function caused the event to drop! [ 339.781547] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 339.792197] kobject: 'loop2' (ffff8880a49c81e0): kobject_uevent_env [ 339.795973] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 339.800560] kobject: 'rx-0' (ffff888081d6df10): kobject_add_internal: parent: 'queues', set: 'queues' [ 339.819516] kobject: 'loop2' (ffff8880a49c81e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 339.821288] kobject: 'rx-0' (ffff888081d6df10): kobject_uevent_env [ 339.841173] kobject: 'rx-0' (ffff888081d6df10): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/rx-0' [ 339.843488] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 339.864115] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 339.864831] kobject: 'tx-0' (ffff88807b2c80d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 339.876831] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 339.887069] kobject: 'tx-0' (ffff88807b2c80d8): kobject_uevent_env [ 339.894019] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 339.896841] kobject: 'tx-0' (ffff88807b2c80d8): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/tx-0' [ 339.918103] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 339.924691] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 339.941264] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 339.947925] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 339.951385] kobject: 'batman_adv' (ffff888099103880): kobject_add_internal: parent: 'veth310', set: '' [ 339.987155] kobject: 'batman_adv' (ffff888099103880): kobject_uevent_env [ 339.996189] kobject: 'batman_adv' (ffff888099103880): kobject_uevent_env: filter function caused the event to drop! [ 340.007146] kobject: 'batman_adv' (ffff888099103880): kobject_cleanup, parent (null) [ 340.011125] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 340.025726] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 340.035344] kobject: 'batman_adv' (ffff888099103880): calling ktype release [ 340.043189] kobject: (ffff888099103880): dynamic_kobj_release [ 340.049234] kobject: 'batman_adv': free name [ 340.058310] kobject: 'rx-0' (ffff888081d6df10): kobject_cleanup, parent ffff8880a95e3248 [ 340.067382] kobject: 'rx-0' (ffff888081d6df10): auto cleanup 'remove' event [ 340.075429] kobject: 'rx-0' (ffff888081d6df10): kobject_uevent_env 04:18:46 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) 04:18:46 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'veth1_to_hsr\x00', {0x2, 0x0, @local}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) r1 = dup(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000400)) r2 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x7, 0x100) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x400, 0x0) ppoll(&(0x7f0000000240)=[{0xffffffffffffffff, 0x8108}, {r2, 0x2000}, {r3, 0x20}, {r4}], 0x4, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x3f}, 0x8) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) 04:18:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x3, 0x8f) msgget(0x0, 0x500) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000240)=[0x100, 0x401, 0x8]) r2 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x2, 0x800081) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000340)=""/221) r3 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x100000001, 0x400000) socket$packet(0x11, 0x1, 0x300) ioctl$VIDIOC_G_FMT(r3, 0xc0d05604, &(0x7f0000000140)={0x4, @win={{0xbd, 0x4, 0xfffffffc, 0x800}, 0x3, 0x7, &(0x7f00000000c0)={{0x7fff, 0x6240bc7, 0x7f, 0xfda6}, &(0x7f0000000080)={{0x95, 0x3f, 0x4001, 0x9}, &(0x7f0000000440)={{0x6, 0x7, 0x9, 0xc593}}}}, 0x2, &(0x7f0000000100)="878874ca7be60aeae686ce89b250815fa1398cfbd52fe560ebeb16b1a51cdf27cbcfcd44a1c7a55db64e596c5da0e3006f6789", 0xa2}}) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 340.083100] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 340.083716] kobject: 'rx-0' (ffff888081d6df10): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/rx-0' [ 340.089624] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 340.114120] kobject: 'rx-0' (ffff888081d6df10): auto cleanup kobject_del [ 340.125219] kobject: 'rx-0' (ffff888081d6df10): calling ktype release [ 340.127486] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env [ 340.139746] kobject: 'rx-0': free name [ 340.144038] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 340.156367] kobject: 'tx-0' (ffff88807b2c80d8): kobject_cleanup, parent ffff8880a95e3248 [ 340.165215] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 340.171920] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 340.174491] kobject: 'tx-0' (ffff88807b2c80d8): auto cleanup 'remove' event [ 340.189665] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 340.208417] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 340.213191] kobject: 'tx-0' (ffff88807b2c80d8): kobject_uevent_env [ 340.224442] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 340.225613] kobject: 'tx-0' (ffff88807b2c80d8): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/tx-0' [ 340.238733] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 340.254759] kobject: 'tx-0' (ffff88807b2c80d8): auto cleanup kobject_del [ 340.263423] kobject: 'tx-0' (ffff88807b2c80d8): calling ktype release [ 340.271539] kobject: 'tx-0': free name [ 340.275529] kobject: 'queues' (ffff8880a95e3248): kobject_cleanup, parent (null) [ 340.284059] kobject: 'queues' (ffff8880a95e3248): calling ktype release [ 340.291151] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 340.298095] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 340.305088] kobject: 'queues' (ffff8880a95e3248): kset_release [ 340.318541] kobject: 'queues': free name [ 340.327072] kobject: 'loop2' (ffff8880a49c81e0): kobject_uevent_env [ 340.333088] kobject: 'veth310' (ffff88805a6b50f0): kobject_uevent_env [ 340.335753] kobject: 'loop2' (ffff8880a49c81e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 340.341180] kobject: 'veth310' (ffff88805a6b50f0): fill_kobj_path: path = '/devices/virtual/net/veth310' 04:18:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/3, 0x3) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 04:18:47 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000aecc25042eff0521fd7938b5ebd2827cf8310c1be697fbe800d9ebd3b1e1d82d0005ddbbb96335d523096c1b5fbb65bd9c255850d8ca60eab08fadae41a7f92fa54d66e24cd73b1938bef2f8019c58e4e2b6aea5dba823b7bb8f40ff8b99f1ddf5eece61c387f5815eccdfa24033ef9105be8662ad7493c219ae6478d2311eee3d97c95924bde76d43d6d51abff4c7921bf651022da5af279f7baeb844622da005acbc7b7f0021626eaadc9659c0f9e0d150109989eca0f4108cf910917245f36dae587da58c8415e7e505ac6290f964981429eac91e9e56a8afce6ac6fdde96267020b29eb6f3dde2511a9485b39aacfc5568a0e265661d3dcb4e7ec03eab0f367801e6d2b5f1b17a13e40e2d642f27fc551fe601609799aede531092f0e668b7847b05000000000000003146ac7af0e7bf126d246cd075eca5f484ae1fc01221c9057683f941a7c62580c0e336edc20f7f9088915b174c686dddbefa79f4280c1e66b94d2c0bb2c4456f7de0123cf03f01830d237b22bc59588aea21b8955d7626511a332dde0e958e4a473feabba86a78ec4e800af9acbbb8edc9c83338b9294163e5467986f24c6b34aff5f48fc0f731cd1226bd5324ed5039478d61a9b484b597fc35036cf6e12bb0c2123c3e0c96a24d9feabd"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r7 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r7, &(0x7f0000000640), 0x12) 04:18:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0x81, "8fcfd3", "972b4c4a625ba877b3498a5deea43cbfd4fdf27c6d48bbd7905491b04735db80c155eda1ef1fc8849d504814b02120abe8539e40169cae9d90215160ab1e995928e59e5c84cdc8b53d564467bd274637a9429de0be592ef79d9098abdaefaffa355f711cfa12aaeeda9066b90d427a06c841d5e5658d17e3cd964a35dc95b4f5a76e870a12b11f00cebe8171be1d59840a06517c92989dcb1a3527c41f4dc043976d172851c4273491e49a8d0fa46c241eb2b47a20e9a95fc6d04b0e6442452f83b44cc2db50c8b272d46dfa72a7a19f5e99514d21a05d51b05f7d90b944e0325525988ef2a104242f35935244145e43df858f626412eae94c2ede2ef25b4f3d"}}, 0x110) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f00000002c0)=""/117, 0x75) [ 340.400588] kobject: 'veth310' (ffff88805a6b50f0): kobject_cleanup, parent (null) [ 340.409178] kobject: 'veth310' (ffff88805a6b50f0): calling ktype release [ 340.416234] kobject: 'veth310': free name 04:18:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket(0x22, 0x2, 0x4) bind$isdn_base(r2, &(0x7f0000000040), 0x6) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000080)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x70bd25, 0x25dfdbfb, {{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, r3}, {@in=@broadcast, 0x0, 0x32}, @in=@remote, {}, {0x0, 0x0, 0x0, 0x1}, {}, 0x0, 0x0, 0x9}, 0x0, 0x8}}, 0xf8}}, 0x0) write(r1, &(0x7f0000000040)="e56e436356b8674839edf2b6cd30a3637ee2d8eaa718bb19236aa4a87cf9ba38b13404bb27bb618341", 0x29) [ 340.470532] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env [ 340.477033] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 340.508870] kobject: 'loop4' (ffff8880a4a96b60): kobject_uevent_env 04:18:47 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 340.524373] kobject: 'loop4' (ffff8880a4a96b60): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 340.551957] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 340.563844] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:18:47 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 340.565085] kobject: 'veth310' (ffff88808a0350b0): kobject_add_internal: parent: 'net', set: 'devices' [ 340.612381] kobject: 'veth310' (ffff88808a0350b0): kobject_uevent_env 04:18:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r1, 0xae9a) ioctl$VFIO_GET_API_VERSION(r1, 0x3b64) 04:18:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r1, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000080)=""/240) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r3) 04:18:47 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 340.620631] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 340.626604] kobject: 'veth310' (ffff88808a0350b0): fill_kobj_path: path = '/devices/virtual/net/veth310' [ 340.639438] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=47190 sclass=netlink_xfrm_socket pig=15149 comm=syz-executor.0 [ 340.658572] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 340.667266] kobject: 'queues' (ffff8880a0875148): kobject_add_internal: parent: 'veth310', set: '' [ 340.688247] kobject: 'loop2' (ffff8880a49c81e0): kobject_uevent_env [ 340.690322] kobject: 'queues' (ffff8880a0875148): kobject_uevent_env [ 340.695578] kobject: 'loop2' (ffff8880a49c81e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 340.709849] kobject: 'queues' (ffff8880a0875148): kobject_uevent_env: filter function caused the event to drop! [ 340.716690] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 340.722162] kobject: 'rx-0' (ffff8880a0ac9490): kobject_add_internal: parent: 'queues', set: 'queues' [ 340.728298] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 340.749413] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=47190 sclass=netlink_xfrm_socket pig=15153 comm=syz-executor.0 [ 340.765630] kobject: 'rx-0' (ffff8880a0ac9490): kobject_uevent_env [ 340.767477] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 340.777710] kobject: 'rx-0' (ffff8880a0ac9490): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/rx-0' [ 340.778613] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 340.797186] kobject: 'tx-0' (ffff8880a54f32d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 340.814781] kobject: 'tx-0' (ffff8880a54f32d8): kobject_uevent_env [ 340.819036] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env [ 340.826115] kobject: 'tx-0' (ffff8880a54f32d8): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/tx-0' [ 340.828114] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 340.858836] kobject: 'batman_adv' (ffff8880975bfe00): kobject_add_internal: parent: 'veth310', set: '' [ 340.882660] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 340.889735] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 340.906077] kobject: 'batman_adv' (ffff8880975bfe00): kobject_uevent_env [ 340.913743] kobject: 'batman_adv' (ffff8880975bfe00): kobject_uevent_env: filter function caused the event to drop! [ 340.924615] kobject: 'batman_adv' (ffff8880975bfe00): kobject_cleanup, parent (null) [ 340.933613] kobject: 'batman_adv' (ffff8880975bfe00): calling ktype release [ 340.941408] kobject: (ffff8880975bfe00): dynamic_kobj_release [ 340.944860] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 340.954035] kobject: 'batman_adv': free name [ 340.959765] kobject: 'rx-0' (ffff8880a0ac9490): kobject_cleanup, parent ffff8880a0875148 [ 340.966986] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:18:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x1620, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x1400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x1) 04:18:47 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x55, 0x200000000d8, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x0, 0x5, 0x4, 0x7, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$notify(r0, 0x402, 0x22) sendmsg$nl_xfrm(r1, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)=0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x0, 0x0, 0x80, 0x1, 0x0, 0x8, 0x102, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000080), 0x1ae7735c43c092d1}, 0x41000, 0x9, 0x3f, 0x3, 0x265d, 0x9302, 0x3}, r2, 0x2, r3, 0x0) 04:18:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(r0, 0x0, 0xfffffffffffffdae) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 340.968212] kobject: 'rx-0' (ffff8880a0ac9490): auto cleanup 'remove' event [ 340.980974] kobject: 'loop2' (ffff8880a49c81e0): kobject_uevent_env [ 340.987724] kobject: 'rx-0' (ffff8880a0ac9490): kobject_uevent_env [ 341.004380] kobject: 'rx-0' (ffff8880a0ac9490): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/rx-0' [ 341.017202] kobject: 'loop2' (ffff8880a49c81e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 341.027923] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 341.035790] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 341.044303] kobject: 'rx-0' (ffff8880a0ac9490): auto cleanup kobject_del [ 341.053083] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 341.054670] kobject: 'rx-0' (ffff8880a0ac9490): calling ktype release [ 341.067948] kobject: 'rx-0': free name [ 341.068075] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 341.072724] kobject: 'tx-0' (ffff8880a54f32d8): kobject_cleanup, parent ffff8880a0875148 [ 341.093195] kobject: 'tx-0' (ffff8880a54f32d8): auto cleanup 'remove' event [ 341.101709] kobject: 'tx-0' (ffff8880a54f32d8): kobject_uevent_env [ 341.108558] kobject: 'tx-0' (ffff8880a54f32d8): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/tx-0' [ 341.121243] kobject: 'tx-0' (ffff8880a54f32d8): auto cleanup kobject_del [ 341.128175] kobject: 'tx-0' (ffff8880a54f32d8): calling ktype release [ 341.135586] kobject: 'tx-0': free name [ 341.141206] kobject: 'queues' (ffff8880a0875148): kobject_cleanup, parent (null) [ 341.149758] kobject: 'queues' (ffff8880a0875148): calling ktype release [ 341.157205] kobject: 'queues' (ffff8880a0875148): kset_release [ 341.165182] kobject: 'queues': free name [ 341.169732] kobject: 'veth310' (ffff88808a0350b0): kobject_uevent_env [ 341.182027] kobject: 'veth310' (ffff88808a0350b0): fill_kobj_path: path = '/devices/virtual/net/veth310' [ 341.190257] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 341.198144] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 341.210183] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env [ 341.223649] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 341.234382] kobject: 'veth310' (ffff88808a0350b0): kobject_cleanup, parent (null) [ 341.242319] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 341.243082] kobject: 'veth310' (ffff88808a0350b0): calling ktype release [ 341.251160] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 341.257175] kobject: 'veth310': free name [ 341.271675] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env 04:18:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:48 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000040)={{{@in=@initdev}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) read(r0, &(0x7f00000002c0)=""/117, 0x75) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:18:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) getcwd(&(0x7f0000000000)=""/47, 0x2f) 04:18:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:48 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000140)) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 341.278130] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:18:48 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 341.315201] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 341.322099] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 341.328567] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 341.347752] kobject: 'loop4' (ffff8880a4a96b60): kobject_uevent_env [ 341.348358] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:18:48 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x103000, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x880, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000080)=0xd3) 04:18:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) syz_init_net_socket$x25(0x9, 0x5, 0x0) 04:18:48 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 341.381339] kobject: 'loop4' (ffff8880a4a96b60): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 341.397736] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 341.415764] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 341.440513] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 341.447078] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 341.452567] kobject: 'veth310' (ffff8880a96c73b0): kobject_add_internal: parent: 'net', set: 'devices' [ 341.466993] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 341.481993] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 341.484462] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 341.498256] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 341.499675] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env 04:18:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80080, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x4, 0x1, 0x1ff, r5}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000005c0)={r5, 0x4, 0x3}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000100)={r5, @in6={{0xa, 0x4e20, 0xffffffff, @loopback, 0x9}}, 0x6, 0x8001}, &(0x7f00000001c0)=0x90) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x9, @default, @rose={'rose', 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) [ 341.536567] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 341.546771] QAT: Invalid ioctl [ 341.553138] kobject: 'veth310' (ffff8880a96c73b0): kobject_uevent_env [ 341.566213] kobject: 'veth310' (ffff8880a96c73b0): fill_kobj_path: path = '/devices/virtual/net/veth310' [ 341.566460] kobject: 'loop2' (ffff8880a49c81e0): kobject_uevent_env [ 341.591895] kobject: 'loop2' (ffff8880a49c81e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 341.597626] kobject: 'queues' (ffff8880715a9a48): kobject_add_internal: parent: 'veth310', set: '' [ 341.603325] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 341.618238] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 341.627039] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 341.632524] kobject: 'queues' (ffff8880715a9a48): kobject_uevent_env [ 341.637636] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 341.648758] kobject: 'queues' (ffff8880715a9a48): kobject_uevent_env: filter function caused the event to drop! [ 341.653152] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env [ 341.670477] kobject: 'rx-0' (ffff888071cb6610): kobject_add_internal: parent: 'queues', set: 'queues' [ 341.671853] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 341.681475] kobject: 'rx-0' (ffff888071cb6610): kobject_uevent_env [ 341.689737] QAT: Invalid ioctl [ 341.705000] kobject: 'rx-0' (ffff888071cb6610): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/rx-0' [ 341.722897] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 341.735834] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 341.752692] kobject: 'tx-0' (ffff888075632ad8): kobject_add_internal: parent: 'queues', set: 'queues' [ 341.781119] kobject: 'tx-0' (ffff888075632ad8): kobject_uevent_env [ 341.789977] kobject: 'tx-0' (ffff888075632ad8): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/tx-0' [ 341.805113] kobject: 'batman_adv' (ffff888095064400): kobject_add_internal: parent: 'veth310', set: '' [ 341.819696] kobject: 'batman_adv' (ffff888095064400): kobject_uevent_env [ 341.827817] kobject: 'batman_adv' (ffff888095064400): kobject_uevent_env: filter function caused the event to drop! [ 341.839384] kobject: 'batman_adv' (ffff888095064400): kobject_cleanup, parent (null) [ 341.848417] kobject: 'batman_adv' (ffff888095064400): calling ktype release [ 341.855985] kobject: (ffff888095064400): dynamic_kobj_release [ 341.862646] kobject: 'batman_adv': free name [ 341.868530] kobject: 'rx-0' (ffff888071cb6610): kobject_cleanup, parent ffff8880715a9a48 [ 341.877019] kobject: 'rx-0' (ffff888071cb6610): auto cleanup 'remove' event [ 341.884345] kobject: 'rx-0' (ffff888071cb6610): kobject_uevent_env [ 341.890999] kobject: 'rx-0' (ffff888071cb6610): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/rx-0' [ 341.903149] kobject: 'rx-0' (ffff888071cb6610): auto cleanup kobject_del [ 341.911549] kobject: 'rx-0' (ffff888071cb6610): calling ktype release [ 341.918187] kobject: 'rx-0': free name [ 341.922652] kobject: 'tx-0' (ffff888075632ad8): kobject_cleanup, parent ffff8880715a9a48 [ 341.930939] kobject: 'tx-0' (ffff888075632ad8): auto cleanup 'remove' event [ 341.938057] kobject: 'tx-0' (ffff888075632ad8): kobject_uevent_env [ 341.944721] kobject: 'tx-0' (ffff888075632ad8): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/tx-0' [ 341.956636] kobject: 'tx-0' (ffff888075632ad8): auto cleanup kobject_del [ 341.964995] kobject: 'tx-0' (ffff888075632ad8): calling ktype release [ 341.971678] kobject: 'tx-0': free name [ 341.975639] kobject: 'queues' (ffff8880715a9a48): kobject_cleanup, parent (null) [ 341.984452] kobject: 'queues' (ffff8880715a9a48): calling ktype release [ 341.991260] kobject: 'queues' (ffff8880715a9a48): kset_release [ 341.997252] kobject: 'queues': free name [ 342.003269] kobject: 'veth310' (ffff8880a96c73b0): kobject_uevent_env [ 342.010141] kobject: 'veth310' (ffff8880a96c73b0): fill_kobj_path: path = '/devices/virtual/net/veth310' 04:18:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) 04:18:48 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$dri(0x0, 0x0, 0x0) write(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x100) ioctl$KVM_NMI(r3, 0xae9a) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000100)={0x12}) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="4800000010000507000400001391910068f13289d2601980280000000000000000acd8e514e2158b6062e23d2cd40f862af51ca3c36430d8adfbe06eca80a33444e765a03be119f5d8df66e40a3c64cb8f3367bb2b1107ae7805eb43502e1be547b2f24eb0c16eb965", @ANYRES32=0x0, @ANYBLOB="0000000000b9cc18649ce8e183b69699b3977a592a0f13af2c1933f19c1bd4ec04490000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, {0x0, 0xe}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}}}]}, 0x58}}, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r6, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r6, 0x0) r7 = dup2(0xffffffffffffffff, r6) ioctl$EVIOCGVERSION(r7, 0x80044501, &(0x7f0000000080)=""/240) ioctl$TIOCGPGRP(r7, 0x540f, 0x0) r8 = openat$full(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x2, &(0x7f0000000540)=[{}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r8, 0x40086425, &(0x7f00000005c0)={r9}) ioctl$DRM_IOCTL_UNLOCK(r7, 0x4008642b, &(0x7f0000000240)={r9, 0x1}) read(r1, &(0x7f00000002c0)=""/117, 0x75) prctl$PR_GET_TIMERSLACK(0x1e) 04:18:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000000)=0xffffffff, 0x4) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:48 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200)=r1, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 342.063096] kobject: 'veth310' (ffff8880a96c73b0): kobject_cleanup, parent (null) [ 342.072102] kobject: 'veth310' (ffff8880a96c73b0): calling ktype release [ 342.079742] kobject: 'veth310': free name 04:18:48 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 342.113741] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 342.125172] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 342.131364] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 342.133682] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 342.139390] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:18:49 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000280)={0x9, 0x4}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, 0x0, 0x0) getpeername(r4, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000200)=0x80) setsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000240)=0x1f, 0x4) read(r3, &(0x7f0000000140)=""/56, 0x38) sendmsg$nl_xfrm(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x40000) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@remote={[], 0x1}, 0x2, 'ifb0\x00'}) [ 342.161643] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 342.168439] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:18:49 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 342.207068] kobject: 'loop4' (ffff8880a4a96b60): kobject_uevent_env [ 342.224143] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 342.246872] kobject: 'loop4' (ffff8880a4a96b60): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:18:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x201}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r2, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffffd}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x200}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x180}, @NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000010}, 0x11) 04:18:49 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x2, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 342.297285] kobject: 'loop2' (ffff8880a49c81e0): kobject_uevent_env [ 342.306399] kobject: 'loop2' (ffff8880a49c81e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 342.308765] kobject: 'veth310' (ffff88805db1d430): kobject_add_internal: parent: 'net', set: 'devices' [ 342.335986] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env 04:18:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x3, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 342.343906] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 342.360216] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 342.369028] kobject: 'veth310' (ffff88805db1d430): kobject_uevent_env [ 342.369419] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 342.380505] kobject: 'veth310' (ffff88805db1d430): fill_kobj_path: path = '/devices/virtual/net/veth310' 04:18:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) sched_getparam(r0, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) [ 342.414552] kobject: 'queues' (ffff8880a5613148): kobject_add_internal: parent: 'veth310', set: '' [ 342.434467] kobject: 'queues' (ffff8880a5613148): kobject_uevent_env [ 342.441393] kobject: 'queues' (ffff8880a5613148): kobject_uevent_env: filter function caused the event to drop! [ 342.444051] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env [ 342.467307] kobject: 'rx-0' (ffff888092135cd0): kobject_add_internal: parent: 'queues', set: 'queues' [ 342.480682] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 342.484794] kobject: 'rx-0' (ffff888092135cd0): kobject_uevent_env [ 342.505731] kobject: 'rx-0' (ffff888092135cd0): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/rx-0' [ 342.525457] kobject: 'loop2' (ffff8880a49c81e0): kobject_uevent_env [ 342.532388] kobject: 'tx-0' (ffff88805dac75d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 342.535404] kobject: 'loop2' (ffff8880a49c81e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 342.549488] kobject: 'tx-0' (ffff88805dac75d8): kobject_uevent_env [ 342.553327] kobject: 'loop0' (ffff8880a49300e0): kobject_uevent_env [ 342.562959] kobject: 'tx-0' (ffff88805dac75d8): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/tx-0' [ 342.571092] kobject: 'loop0' (ffff8880a49300e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 342.596854] kobject: 'batman_adv' (ffff8880a5315e00): kobject_add_internal: parent: 'veth310', set: '' [ 342.612389] kobject: 'batman_adv' (ffff8880a5315e00): kobject_uevent_env [ 342.619479] kobject: 'batman_adv' (ffff8880a5315e00): kobject_uevent_env: filter function caused the event to drop! [ 342.631542] kobject: 'batman_adv' (ffff8880a5315e00): kobject_cleanup, parent (null) [ 342.640603] kobject: 'batman_adv' (ffff8880a5315e00): calling ktype release [ 342.647743] kobject: (ffff8880a5315e00): dynamic_kobj_release [ 342.654327] kobject: 'batman_adv': free name [ 342.659492] kobject: 'rx-0' (ffff888092135cd0): kobject_cleanup, parent ffff8880a5613148 [ 342.668085] kobject: 'rx-0' (ffff888092135cd0): auto cleanup 'remove' event [ 342.675265] kobject: 'rx-0' (ffff888092135cd0): kobject_uevent_env [ 342.681908] kobject: 'rx-0' (ffff888092135cd0): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/rx-0' [ 342.693376] kobject: 'rx-0' (ffff888092135cd0): auto cleanup kobject_del [ 342.700438] kobject: 'rx-0' (ffff888092135cd0): calling ktype release [ 342.707088] kobject: 'rx-0': free name [ 342.711954] kobject: 'tx-0' (ffff88805dac75d8): kobject_cleanup, parent ffff8880a5613148 [ 342.720849] kobject: 'tx-0' (ffff88805dac75d8): auto cleanup 'remove' event [ 342.728027] kobject: 'tx-0' (ffff88805dac75d8): kobject_uevent_env [ 342.735359] kobject: 'tx-0' (ffff88805dac75d8): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/tx-0' [ 342.748892] kobject: 'tx-0' (ffff88805dac75d8): auto cleanup kobject_del [ 342.756212] kobject: 'tx-0' (ffff88805dac75d8): calling ktype release [ 342.762867] kobject: 'tx-0': free name [ 342.767732] kobject: 'queues' (ffff8880a5613148): kobject_cleanup, parent (null) [ 342.776241] kobject: 'queues' (ffff8880a5613148): calling ktype release [ 342.783256] kobject: 'queues' (ffff8880a5613148): kset_release [ 342.789363] kobject: 'queues': free name [ 342.794269] kobject: 'veth310' (ffff88805db1d430): kobject_uevent_env [ 342.801065] kobject: 'veth310' (ffff88805db1d430): fill_kobj_path: path = '/devices/virtual/net/veth310' 04:18:49 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='limits\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000140)) 04:18:49 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x0, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/117, 0x75) 04:18:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x25) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000100)={0x0, 0x4, 0x3, &(0x7f00000000c0)=0x4deb}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r2, 0xc00000c0045005, &(0x7f0000000180)=0x80) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x3) write$nbd(r2, &(0x7f0000000040)=ANY=[@ANYRES64], 0x1) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4, 0xfff}) 04:18:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffe26, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x307a10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700008bce1dc4c04b92ab0000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000051f0fc6c90eccb421dd7a1c4bf5092e154a72a00c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x28, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r7}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x0, 0x1, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, '\'f5S:~i+'}, 0x10}}, 0x8040) r8 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000380)={r1, 0x9, 0x30}, 0xc) write$cgroup_pid(r8, &(0x7f0000000640), 0x12) [ 342.853019] kobject: 'veth310' (ffff88805db1d430): kobject_cleanup, parent (null) [ 342.861716] kobject: 'veth310' (ffff88805db1d430): calling ktype release [ 342.868613] kobject: 'veth310': free name 04:18:49 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x0, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 342.897248] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 342.902330] QAT: Invalid ioctl [ 342.904097] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 342.919941] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 342.927633] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 342.959898] kobject: 'loop4' (ffff8880a4a96b60): kobject_uevent_env [ 342.974191] kobject: 'loop4' (ffff8880a4a96b60): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 342.987775] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 342.997409] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 343.014480] kobject: 'loop2' (ffff8880a49c81e0): kobject_uevent_env [ 343.024585] kobject: 'veth310' (ffff888095f6d2b0): kobject_add_internal: parent: 'net', set: 'devices' [ 343.025997] kobject: 'loop2' (ffff8880a49c81e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 343.050413] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 343.051609] kobject: 'veth310' (ffff888095f6d2b0): kobject_uevent_env [ 343.064231] kobject: 'veth310' (ffff888095f6d2b0): fill_kobj_path: path = '/devices/virtual/net/veth310' [ 343.066411] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 343.075698] kobject: 'queues' (ffff88809b91bc48): kobject_add_internal: parent: 'veth310', set: '' [ 343.098548] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 343.105181] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 343.115227] kobject: 'queues' (ffff88809b91bc48): kobject_uevent_env [ 343.125547] kobject: 'queues' (ffff88809b91bc48): kobject_uevent_env: filter function caused the event to drop! [ 343.142833] kobject: 'rx-0' (ffff888083074c10): kobject_add_internal: parent: 'queues', set: 'queues' [ 343.158001] kobject: 'rx-0' (ffff888083074c10): kobject_uevent_env [ 343.165362] kobject: 'rx-0' (ffff888083074c10): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/rx-0' [ 343.182031] kobject: 'tx-0' (ffff8880a9df1a98): kobject_add_internal: parent: 'queues', set: 'queues' [ 343.195711] kobject: 'tx-0' (ffff8880a9df1a98): kobject_uevent_env [ 343.202670] kobject: 'tx-0' (ffff8880a9df1a98): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/tx-0' [ 343.221163] kobject: 'batman_adv' (ffff8880963bdd80): kobject_add_internal: parent: 'veth310', set: '' [ 343.246368] kobject: 'batman_adv' (ffff8880963bdd80): kobject_uevent_env [ 343.253523] kobject: 'batman_adv' (ffff8880963bdd80): kobject_uevent_env: filter function caused the event to drop! 04:18:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r1, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000080)=""/240) r3 = open(&(0x7f0000000000)='./file0\x00', 0x101900, 0x100) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0x8e) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) read(r0, &(0x7f00000002c0)=""/117, 0x75) 04:18:50 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x0, 0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000040)) [ 343.273057] kobject: 'batman_adv' (ffff8880963bdd80): kobject_cleanup, parent (null) [ 343.276660] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 343.282106] kobject: 'batman_adv' (ffff8880963bdd80): calling ktype release [ 343.298434] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 343.305918] kobject: (ffff8880963bdd80): dynamic_kobj_release [ 343.315905] kobject: 'batman_adv': free name 04:18:50 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) r1 = getpid() kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) r2 = openat$mixer(0xffffffffffffff9c, 0x0, 0x800, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x15d) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, r2, 0x0, 0x27, &(0x7f0000000380)='em0!ppp1eth1\xb3-\xbf@nodevselinux#em1)[self\x00', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000140)='vfat\x00', r4}, 0x30) rt_tgsigqueueinfo(r0, r5, 0x3d, &(0x7f0000000340)={0x4, 0x100, 0x7}) fchdir(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0xfffffffffffffd7f) getresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000000c0), 0x4000) fchdir(r6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'veth1_to_hsr\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000080)={0xd, 0x6, 0x6}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) mount$9p_xen(0x0, 0x0, &(0x7f0000000280)='9p\x80', 0x0, 0x0) [ 343.323354] kobject: 'rx-0' (ffff888083074c10): kobject_cleanup, parent ffff88809b91bc48 [ 343.334159] kobject: 'rx-0' (ffff888083074c10): auto cleanup 'remove' event [ 343.341605] kobject: 'rx-0' (ffff888083074c10): kobject_uevent_env [ 343.343533] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 343.348334] kobject: 'rx-0' (ffff888083074c10): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/rx-0' 04:18:50 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x0) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:50 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x0) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) 04:18:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1, 0x10, 0x4}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={r1, @in6={{0xa, 0x4e23, 0x0, @rand_addr="c710d320ba68abd20b66383f94b75f59", 0x6}}, 0x8, 0x1, 0x0, 0x2, 0x3}, &(0x7f0000000140)=0x98) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f00000002c0)=""/117, 0x75) [ 343.356639] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 343.387190] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 343.408471] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 343.413757] kobject: 'rx-0' (ffff888083074c10): auto cleanup kobject_del [ 343.432249] kobject: 'rx-0' (ffff888083074c10): calling ktype release [ 343.443718] kobject: 'loop2' (ffff8880a49c81e0): kobject_uevent_env [ 343.443952] kobject: 'rx-0': free name [ 343.450469] kobject: 'loop2' (ffff8880a49c81e0): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:18:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x5) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 343.461723] kobject: 'tx-0' (ffff8880a9df1a98): kobject_cleanup, parent ffff88809b91bc48 [ 343.477925] QAT: Invalid ioctl [ 343.484943] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 343.487910] kobject: 'tx-0' (ffff8880a9df1a98): auto cleanup 'remove' event [ 343.499330] kobject: 'tx-0' (ffff8880a9df1a98): kobject_uevent_env [ 343.499504] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:18:50 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x0) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) [ 343.510903] kobject: 'tx-0' (ffff8880a9df1a98): fill_kobj_path: path = '/devices/virtual/net/veth310/queues/tx-0' [ 343.524498] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 343.537004] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 343.539541] kobject: 'tx-0' (ffff8880a9df1a98): auto cleanup kobject_del [ 343.556831] kobject: 'tx-0' (ffff8880a9df1a98): calling ktype release [ 343.565521] kobject: 'loop1' (ffff8880a496e160): kobject_uevent_env [ 343.569585] kobject: 'tx-0': free name [ 343.578755] kobject: 'queues' (ffff88809b91bc48): kobject_cleanup, parent (null) [ 343.579507] kobject: 'loop1' (ffff8880a496e160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 343.587812] kobject: 'queues' (ffff88809b91bc48): calling ktype release [ 343.604937] kobject: 'loop5' (ffff8880a4b01460): kobject_uevent_env [ 343.622283] kobject: 'loop5' (ffff8880a4b01460): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 343.640422] kobject: 'loop2' (ffff8880a49c81e0): kobject_uevent_env [ 343.642280] kobject: 'queues' (ffff88809b91bc48): kset_release [ 343.646883] kobject: 'loop2' (ffff8880a49c81e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 343.670894] kobject: 'queues': free name [ 343.676045] kobject: 'veth310' (ffff888095f6d2b0): kobject_uevent_env [ 343.682968] kobject: 'veth310' (ffff888095f6d2b0): fill_kobj_path: path = '/devices/virtual/net/veth310' [ 343.720782] kobject: 'veth310' (ffff888095f6d2b0): kobject_cleanup, parent (null) [ 343.729424] kobject: 'veth310' (ffff888095f6d2b0): calling ktype release [ 343.736454] kobject: 'veth310': free name [ 343.781353] kobject: 'loop4' (ffff8880a4a96b60): kobject_uevent_env [ 343.787881] kobject: 'loop4' (ffff8880a4a96b60): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 343.807993] kobject: 'loop3' (ffff8880a4a4e260): kobject_uevent_env [ 343.814813] kobject: 'loop3' (ffff8880a4a4e260): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:18:50 executing program 1: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0,