f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) 12:00:04 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:04 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:05 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:05 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, 0x0, 0x0) 12:00:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, 0x0, 0x0) 12:00:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:05 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, 0x0, 0x0) 12:00:06 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:06 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_create1(0x80000) 12:00:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0x0) 12:00:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, 0x0, 0x0) 12:00:07 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:07 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:07 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:07 executing program 3: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_create1(0x80000) 12:00:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0x0) 12:00:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0x0) 12:00:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0x0) 12:00:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:08 executing program 3: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0x0) 12:00:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0x0) 12:00:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0x0) 12:00:09 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:09 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_create1(0x80000) 12:00:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:10 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_create1(0x80000) 12:00:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0x0) 12:00:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:10 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_create1(0x80000) 12:00:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:10 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:10 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad3"], 0x90) 12:00:11 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad3"], 0x90) 12:00:12 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:12 executing program 2: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:12 executing program 3: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:13 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_create1(0x80000) 12:00:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="94"], 0x1) 12:00:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:13 executing program 3: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad3"], 0x90) 12:00:13 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_create1(0x80000) 12:00:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="94"], 0x1) 12:00:13 executing program 3: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:13 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:13 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:13 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:13 executing program 3: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:13 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_create1(0x80000) 12:00:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:14 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:14 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) 12:00:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="94"], 0x1) 12:00:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:15 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) 12:00:15 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:15 executing program 3: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:15 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:00:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000040)="baa000edf26df20f080347640f0058d5640f320f381dec0f221b8d4e9c66b80500000066b94a7b00000f01c1", 0x2c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000000c0)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:00:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 12:00:15 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) 12:00:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837"], 0x49) 12:00:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) [ 359.433285] kvm: pic: non byte read [ 359.450875] kvm: pic: non byte read [ 359.479383] kvm: pic: single mode not supported [ 359.491806] kvm: pic: non byte read [ 359.551067] kvm: pic: non byte read [ 359.583637] kvm: pic: non byte read [ 359.609700] kvm: pic: level sensitive irq not supported [ 359.612097] kvm: pic: non byte read [ 359.650442] kvm: pic: single mode not supported 12:00:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:16 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837"], 0x49) 12:00:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000340)=0x1950, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="cc", 0x1, 0x0, 0x0, 0x0) [ 359.650455] kvm: pic: level sensitive irq not supported [ 359.735881] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 359.744364] IPVS: ftp: loaded support on port[0] = 21 [ 359.777058] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 359.853880] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:00:16 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)=ANY=[], 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, 0x0) r2 = inotify_init() setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000280)="393c7cd52dce9eca1b205550a7baee5dd81bdccdce70a26afc0cbe08443af1d28e1d2e179a72f0d92f5e89a5f978d431f8bff84cb32bc84ee632b2e5ec4d0d7cea61853f38c8f9e0dd7cae3bfafb6f28e37606113522df236e4d81c942425cff5109060a396fa4b77532e4760e28a92532cadff0a06e1f82a78d81a210ae5804b743b803ceae167fbfd64aedf13199257f951dbbc7fd996b25b7a86ecfe99587f6ec72530ea8ae2a0e69f539227520bd7037b860a59abbf459f9950cea34d51d33924cd7f3dfb7d6bc61e6", 0xcb) inotify_add_watch(r2, &(0x7f0000000080)='.\x00', 0xfe) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000082) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000380)={0xf, 0x13c, 0x8000, {0x0, 0x1c9c380}, 0x3, 0x101}) write$binfmt_elf64(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="65f336224bdd3b533505b3540906a7d2b6e81417ddac3f7579a9f7cb43df7977d2398d7aae159d1ca72389318a97654cb2f338e208935a4aee0ef447abda321bc89f4a4c9d2cf661f92d143117c175f6325f8671c851f73ce100e0ac9a58d48cd9f4624de5d1e9f816720c4dcfc5b494d24ce994e13e93e1e882dc5ede48c455dd212b722f8faf7af1915fa10afd6e49b938d4af5fdfea32f972c995740f11f084fa0587e0839d26766d74e04e9c509f04e15fb2c991084b8c332ec3babb1239c93d983929366fbdee71223701e80595368bc7"], 0xd3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) 12:00:16 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) [ 360.197012] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 360.226342] IPVS: ftp: loaded support on port[0] = 21 [ 360.290365] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:00:16 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:00:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000)="1340", 0x0}, 0x18) 12:00:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4000000009) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$binfmt_misc(r2, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x4) write(r2, &(0x7f0000000200)='}', 0x1) r3 = accept4(r1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) write$binfmt_elf32(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 12:00:16 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837"], 0x49) 12:00:16 executing program 3: 12:00:16 executing program 1: [ 360.602342] sctp: failed to load transform for md5: -2 12:00:16 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:17 executing program 3: 12:00:17 executing program 1: 12:00:17 executing program 3: [ 361.031560] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 361.061488] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:00:17 executing program 2: 12:00:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d"], 0x6d) 12:00:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:17 executing program 1: 12:00:17 executing program 3: 12:00:17 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:17 executing program 3: 12:00:17 executing program 1: 12:00:17 executing program 2: 12:00:17 executing program 3: 12:00:17 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syslog(0x3, &(0x7f0000000080)=""/131, 0x20000103) 12:00:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x4) 12:00:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40480923, 0x0) 12:00:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d"], 0x6d) 12:00:18 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:18 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget(0x0, 0x203) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r0, 0x0) 12:00:18 executing program 3: r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/rt_acct\x00') dup3(r0, r1, 0x0) 12:00:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d"], 0x6d) 12:00:18 executing program 3: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:18 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:18 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837"], 0x49) 12:00:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612"], 0x7f) 12:00:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d"], 0x6d) 12:00:18 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:19 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d"], 0x6d) 12:00:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612"], 0x7f) 12:00:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837"], 0x49) 12:00:19 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612"], 0x7f) 12:00:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d"], 0x6d) 12:00:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837"], 0x49) 12:00:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:19 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:20 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87"], 0x88) 12:00:20 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:20 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:20 executing program 3: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87"], 0x88) 12:00:20 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:21 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:21 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87"], 0x88) 12:00:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="94"], 0x1) 12:00:21 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:21 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) 12:00:21 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:21 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:21 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="94"], 0x1) 12:00:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2"], 0x8c) 12:00:22 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2"], 0x8c) 12:00:22 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) 12:00:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="94"], 0x1) 12:00:22 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_create1(0x80000) 12:00:22 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:23 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2"], 0x8c) 12:00:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2"], 0x8c) 12:00:23 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:23 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) 12:00:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2"], 0x8c) 12:00:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24b"], 0x8e) 12:00:24 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:24 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:24 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:24 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24b"], 0x8e) 12:00:24 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:24 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:24 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) 12:00:24 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) 12:00:25 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:25 executing program 1: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) acct(0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:25 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) acct(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24b"], 0x8e) 12:00:25 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:25 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:25 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) 12:00:25 executing program 1: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:25 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:25 executing program 2: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:26 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:26 executing program 2 (fault-call:10 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:26 executing program 1: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bba"], 0x8f) [ 369.964062] FAULT_INJECTION: forcing a failure. [ 369.964062] name failslab, interval 1, probability 0, space 0, times 1 12:00:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24b"], 0x8e) [ 370.155950] CPU: 1 PID: 18237 Comm: syz-executor.2 Not tainted 4.14.113 #3 [ 370.163055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.173272] Call Trace: [ 370.176687] dump_stack+0x138/0x19c [ 370.182913] should_fail.cold+0x10f/0x159 [ 370.187644] should_failslab+0xdb/0x130 [ 370.192414] __kmalloc+0x2f3/0x7a0 [ 370.196985] ? ext4_find_extent+0x709/0x960 [ 370.201437] ext4_find_extent+0x709/0x960 [ 370.205712] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 370.211238] ext4_ext_map_blocks+0x1a3/0x4fb0 [ 370.215887] ? save_trace+0x290/0x290 [ 370.219731] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 370.224778] ? __lock_is_held+0xb6/0x140 [ 370.228965] ? lock_acquire+0x16f/0x430 [ 370.233070] ? ext4_map_blocks+0x354/0x16e0 [ 370.237442] ext4_map_blocks+0xc8a/0x16e0 [ 370.241649] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 370.246445] ? ext4_issue_zeroout+0x160/0x160 [ 370.250985] ext4_alloc_file_blocks+0x22f/0x8b0 [ 370.255785] ? ext4_extent_block_csum_set+0x330/0x330 [ 370.261012] ? ext4_fallocate+0x1cd/0x1cd0 [ 370.265823] ext4_fallocate+0x765/0x1cd0 [ 370.270349] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 370.275836] ? rcu_read_lock_sched_held+0x110/0x130 [ 370.281898] ? ext4_insert_range+0x1130/0x1130 [ 370.286609] vfs_fallocate+0x351/0x7a0 [ 370.290558] ioctl_preallocate+0x14c/0x1c0 [ 370.294844] ? vfs_ioctl+0xb0/0xb0 [ 370.298427] do_vfs_ioctl+0xe01/0x1070 [ 370.302342] ? selinux_file_mprotect+0x5d0/0x5d0 [ 370.307133] ? lock_downgrade+0x6e0/0x6e0 [ 370.311321] ? ioctl_preallocate+0x1c0/0x1c0 [ 370.317311] ? __fget+0x237/0x370 [ 370.320975] ? security_file_ioctl+0x8f/0xc0 [ 370.325419] SyS_ioctl+0x8f/0xc0 [ 370.328818] ? do_vfs_ioctl+0x1070/0x1070 [ 370.332997] do_syscall_64+0x1eb/0x630 [ 370.336918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 370.343710] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 370.349483] RIP: 0033:0x458da9 [ 370.352877] RSP: 002b:00007fd9ebd09c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 370.360707] RAX: ffffffffffffffda RBX: 00007fd9ebd09c90 RCX: 0000000000458da9 [ 370.368350] RDX: 0000000020000000 RSI: 000000004030582a RDI: 0000000000000007 [ 370.375673] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 370.383442] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9ebd0a6d4 [ 370.392078] R13: 00000000004c22d3 R14: 00000000004d4bf8 R15: 0000000000000008 12:00:26 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:27 executing program 3 (fault-call:2 fault-nth:0): syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:27 executing program 2 (fault-call:10 fault-nth:1): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bba"], 0x8f) 12:00:27 executing program 1: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) [ 370.943574] FAULT_INJECTION: forcing a failure. [ 370.943574] name failslab, interval 1, probability 0, space 0, times 0 [ 370.955881] CPU: 0 PID: 18292 Comm: syz-executor.2 Not tainted 4.14.113 #3 [ 370.962946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.972595] Call Trace: [ 370.975233] dump_stack+0x138/0x19c [ 370.978949] should_fail.cold+0x10f/0x159 [ 370.983148] should_failslab+0xdb/0x130 [ 370.987380] kmem_cache_alloc+0x47/0x780 [ 370.991601] __es_insert_extent+0x26c/0xe60 [ 370.996344] ext4_es_insert_extent+0x1f0/0x590 [ 371.001139] ? check_preemption_disabled+0x3c/0x250 [ 371.006897] ? ext4_es_find_delayed_extent_range+0x970/0x970 [ 371.013028] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 371.020455] ? ext4_es_find_delayed_extent_range+0x31d/0x970 [ 371.026779] ext4_ext_put_gap_in_cache+0xcb/0x110 [ 371.031849] ? ext4_zeroout_es+0x170/0x170 [ 371.036127] ? ext4_ext_map_blocks+0x2021/0x4fb0 [ 371.040933] ext4_ext_map_blocks+0x1d52/0x4fb0 [ 371.045542] ? save_trace+0x290/0x290 [ 371.049903] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 371.054947] ? __lock_is_held+0xb6/0x140 [ 371.059495] ? lock_acquire+0x16f/0x430 [ 371.063581] ? ext4_map_blocks+0x354/0x16e0 [ 371.068163] ext4_map_blocks+0xc8a/0x16e0 [ 371.072344] ? ext4_issue_zeroout+0x160/0x160 [ 371.076985] ? __ext4_journal_start_sb+0x105/0x450 [ 371.082642] ? ext4_alloc_file_blocks+0x204/0x8b0 [ 371.088233] ext4_alloc_file_blocks+0x22f/0x8b0 [ 371.092948] ? ext4_extent_block_csum_set+0x330/0x330 [ 371.098199] ? ext4_fallocate+0x1cd/0x1cd0 [ 371.102486] ext4_fallocate+0x765/0x1cd0 [ 371.108197] ? ext4_insert_range+0x1130/0x1130 [ 371.114644] vfs_fallocate+0x351/0x7a0 [ 371.118600] ioctl_preallocate+0x14c/0x1c0 [ 371.123251] ? vfs_ioctl+0xb0/0xb0 [ 371.127139] ? __might_sleep+0x93/0xb0 [ 371.131163] do_vfs_ioctl+0xe01/0x1070 [ 371.135162] ? selinux_file_mprotect+0x5d0/0x5d0 [ 371.140480] ? lock_downgrade+0x6e0/0x6e0 [ 371.144987] ? ioctl_preallocate+0x1c0/0x1c0 [ 371.149948] ? __fget+0x237/0x370 [ 371.153834] ? security_file_ioctl+0x8f/0xc0 [ 371.158287] SyS_ioctl+0x8f/0xc0 [ 371.161702] ? do_vfs_ioctl+0x1070/0x1070 [ 371.165905] do_syscall_64+0x1eb/0x630 [ 371.169928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.174828] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.180145] RIP: 0033:0x458da9 [ 371.184241] RSP: 002b:00007fd9ebd09c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 371.192727] RAX: ffffffffffffffda RBX: 00007fd9ebd09c90 RCX: 0000000000458da9 [ 371.200031] RDX: 0000000020000000 RSI: 000000004030582a RDI: 0000000000000007 [ 371.207945] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 371.215449] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9ebd0a6d4 [ 371.223025] R13: 00000000004c22d3 R14: 00000000004d4bf8 R15: 0000000000000008 12:00:27 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) [ 371.246082] FAULT_INJECTION: forcing a failure. [ 371.246082] name failslab, interval 1, probability 0, space 0, times 0 [ 371.308724] CPU: 0 PID: 18302 Comm: syz-executor.3 Not tainted 4.14.113 #3 [ 371.316263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.325729] Call Trace: [ 371.328343] dump_stack+0x138/0x19c [ 371.332015] should_fail.cold+0x10f/0x159 [ 371.336195] should_failslab+0xdb/0x130 [ 371.340320] kmem_cache_alloc+0x2d9/0x780 [ 371.345185] ? lock_downgrade+0x6e0/0x6e0 [ 371.349366] getname_flags+0xcb/0x580 [ 371.354879] getname+0x1a/0x20 [ 371.359073] do_sys_open+0x1e7/0x430 [ 371.362921] ? filp_open+0x70/0x70 [ 371.366483] SyS_open+0x2d/0x40 [ 371.369781] ? do_sys_open+0x430/0x430 [ 371.373693] do_syscall_64+0x1eb/0x630 [ 371.377605] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.382477] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.387784] RIP: 0033:0x412d41 [ 371.391775] RSP: 002b:00007ff553a24bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 371.401054] RAX: ffffffffffffffda RBX: 00007ff553a24c90 RCX: 0000000000412d41 12:00:27 executing program 2 (fault-call:10 fault-nth:2): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:27 executing program 1 (fault-call:11 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) [ 371.401062] RDX: 00007ff553a24bdf RSI: 0000000000000002 RDI: 00007ff553a24bd0 [ 371.401068] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 000000000000000f [ 371.401073] R10: 0000000000000004 R11: 0000000000000293 R12: 00007ff553a256d4 [ 371.401079] R13: 00000000004c7d53 R14: 00000000004dde50 R15: 0000000000000004 12:00:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bba"], 0x8f) [ 371.650174] FAULT_INJECTION: forcing a failure. [ 371.650174] name failslab, interval 1, probability 0, space 0, times 0 [ 371.669070] CPU: 0 PID: 18314 Comm: syz-executor.1 Not tainted 4.14.113 #3 [ 371.676160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.686403] Call Trace: [ 371.689015] dump_stack+0x138/0x19c [ 371.692668] should_fail.cold+0x10f/0x159 [ 371.696946] should_failslab+0xdb/0x130 [ 371.701125] __kmalloc+0x2f3/0x7a0 [ 371.704893] ? find_held_lock+0x35/0x130 [ 371.709010] ? ext4_find_extent+0x709/0x960 [ 371.713734] ext4_find_extent+0x709/0x960 [ 371.718358] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 371.724373] ext4_ext_map_blocks+0x1a3/0x4fb0 [ 371.728915] ? save_trace+0x290/0x290 [ 371.732756] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 371.738072] ? __lock_is_held+0xb6/0x140 [ 371.742182] ? lock_acquire+0x16f/0x430 [ 371.746173] ? ext4_map_blocks+0x77b/0x16e0 [ 371.750517] ext4_map_blocks+0x7d3/0x16e0 [ 371.754694] ? ext4_issue_zeroout+0x160/0x160 [ 371.759239] ? __ext4_journal_start_sb+0x105/0x450 [ 371.764254] ? ext4_alloc_file_blocks+0x204/0x8b0 [ 371.770640] ext4_alloc_file_blocks+0x22f/0x8b0 [ 371.775430] ? ext4_extent_block_csum_set+0x330/0x330 [ 371.780646] ext4_fallocate+0x765/0x1cd0 [ 371.784731] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 371.790210] ? rcu_read_lock_sched_held+0x110/0x130 [ 371.795435] ? ext4_insert_range+0x1130/0x1130 [ 371.800063] vfs_fallocate+0x351/0x7a0 [ 371.804160] ioctl_preallocate+0x14c/0x1c0 [ 371.808434] ? vfs_ioctl+0xb0/0xb0 [ 371.812122] ? __might_sleep+0x93/0xb0 [ 371.816358] do_vfs_ioctl+0xe01/0x1070 [ 371.820363] ? selinux_file_mprotect+0x5d0/0x5d0 [ 371.825257] ? lock_downgrade+0x6e0/0x6e0 [ 371.829795] ? ioctl_preallocate+0x1c0/0x1c0 [ 371.834258] ? __fget+0x237/0x370 [ 371.837728] ? security_file_ioctl+0x8f/0xc0 [ 371.842183] SyS_ioctl+0x8f/0xc0 [ 371.845703] ? do_vfs_ioctl+0x1070/0x1070 [ 371.849961] do_syscall_64+0x1eb/0x630 [ 371.853956] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.858847] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.864762] RIP: 0033:0x458da9 [ 371.868771] RSP: 002b:00007f70270e6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 371.878903] RAX: ffffffffffffffda RBX: 00007f70270e6c90 RCX: 0000000000458da9 [ 371.886773] RDX: 0000000020000000 RSI: 000000004030582a RDI: 0000000000000006 12:00:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:28 executing program 3 (fault-call:2 fault-nth:1): syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') [ 371.895013] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 371.903948] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f70270e76d4 [ 371.911326] R13: 00000000004c22d3 R14: 00000000004d4bf8 R15: 0000000000000007 12:00:28 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) [ 372.013999] FAULT_INJECTION: forcing a failure. [ 372.013999] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 372.026278] CPU: 1 PID: 18337 Comm: syz-executor.3 Not tainted 4.14.113 #3 [ 372.034350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.043729] Call Trace: [ 372.043761] dump_stack+0x138/0x19c [ 372.043781] should_fail.cold+0x10f/0x159 [ 372.043797] __alloc_pages_nodemask+0x1d6/0x7a0 [ 372.054323] ? fs_reclaim_acquire+0x20/0x20 [ 372.054340] ? __alloc_pages_slowpath+0x2930/0x2930 [ 372.063481] cache_grow_begin+0x80/0x410 [ 372.063497] kmem_cache_alloc+0x6a8/0x780 [ 372.063509] ? lock_downgrade+0x6e0/0x6e0 [ 372.063543] getname_flags+0xcb/0x580 [ 372.063555] getname+0x1a/0x20 [ 372.063571] do_sys_open+0x1e7/0x430 [ 372.081439] ? filp_open+0x70/0x70 [ 372.081461] SyS_open+0x2d/0x40 [ 372.095854] ? do_sys_open+0x430/0x430 [ 372.095871] do_syscall_64+0x1eb/0x630 [ 372.095885] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 372.103199] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 372.117411] RIP: 0033:0x412d41 [ 372.120727] RSP: 002b:00007ff553a24bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 372.120741] RAX: ffffffffffffffda RBX: 00007ff553a24c90 RCX: 0000000000412d41 [ 372.120747] RDX: 00007ff553a24bdf RSI: 0000000000000002 RDI: 00007ff553a24bd0 [ 372.120753] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 000000000000000f [ 372.120759] R10: 0000000000000004 R11: 0000000000000293 R12: 00007ff553a256d4 [ 372.120766] R13: 00000000004c7d53 R14: 00000000004dde50 R15: 0000000000000004 12:00:28 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:28 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:28 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:29 executing program 3 (fault-call:2 fault-nth:2): syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:29 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) [ 372.916798] FAULT_INJECTION: forcing a failure. [ 372.916798] name failslab, interval 1, probability 0, space 0, times 0 12:00:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) fstatfs(r2, &(0x7f0000000540)=""/80) 12:00:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80002000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r4, 0x600, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x8, 0x81, 0x9, 0x6}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x44000}, 0x20000051) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000540)={0x68, r4, 0x420, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x7ff, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x4014) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) write$smack_current(r1, &(0x7f0000000600)='-nodevem0\x00', 0xa) 12:00:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) [ 373.084514] CPU: 1 PID: 18386 Comm: syz-executor.3 Not tainted 4.14.113 #3 [ 373.091893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.101297] Call Trace: [ 373.104149] dump_stack+0x138/0x19c [ 373.107809] should_fail.cold+0x10f/0x159 [ 373.112109] should_failslab+0xdb/0x130 [ 373.116251] kmem_cache_alloc+0x2d9/0x780 [ 373.120612] ? save_stack+0xa9/0xd0 [ 373.124461] get_empty_filp+0x8c/0x3b0 [ 373.128454] path_openat+0x8f/0x3f70 [ 373.132192] ? trace_hardirqs_on+0x10/0x10 [ 373.136449] ? check_preemption_disabled+0x3c/0x250 [ 373.142049] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 373.146748] ? find_held_lock+0x35/0x130 [ 373.150955] ? save_trace+0x290/0x290 [ 373.154791] ? __alloc_fd+0x1d4/0x4a0 [ 373.158630] do_filp_open+0x18e/0x250 [ 373.162543] ? may_open_dev+0xe0/0xe0 [ 373.166459] ? lock_downgrade+0x6e0/0x6e0 [ 373.170753] ? _raw_spin_unlock+0x2d/0x50 [ 373.174945] ? __alloc_fd+0x1d4/0x4a0 [ 373.178774] do_sys_open+0x2c5/0x430 [ 373.182532] ? filp_open+0x70/0x70 [ 373.186117] SyS_open+0x2d/0x40 [ 373.189527] ? do_sys_open+0x430/0x430 [ 373.193434] do_syscall_64+0x1eb/0x630 [ 373.197349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 373.202224] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 373.207531] RIP: 0033:0x412d41 [ 373.210829] RSP: 002b:00007ff553a24bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 373.218561] RAX: ffffffffffffffda RBX: 00007ff553a24c90 RCX: 0000000000412d41 [ 373.225854] RDX: 00007ff553a24bdf RSI: 0000000000000002 RDI: 00007ff553a24bd0 [ 373.233139] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 000000000000000f [ 373.240432] R10: 0000000000000004 R11: 0000000000000293 R12: 00007ff553a256d4 [ 373.247734] R13: 00000000004c7d53 R14: 00000000004dde50 R15: 0000000000000004 12:00:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:29 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x533a) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) fadvise64(r2, 0x0, 0x3, 0x5) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:29 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2c8000, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(r3, 0x0, 0x20004040) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x8001, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2092f4a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:29 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:30 executing program 3: getsockname$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r0 = socket$l2tp(0x18, 0x1, 0x1) lseek(r0, 0x0, 0x1) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:30 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) write$P9_RSTATFS(r2, &(0x7f0000000380)={0x43, 0x9, 0x2, {0x6, 0x3, 0x1, 0xd7, 0x200, 0x3ff, 0x6, 0x1f, 0x20}}, 0x43) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$VT_RELDISP(r0, 0x5605) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0a597b506522e622526c98bd00389d4c6643534ef34b042a13f0d15b0a4a0f98e6a3a2c5dadace2d5ace04d5660d6cee2bfbbc2ed8f33c0f4e7f47695cc2861c"], 0x0) 12:00:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80002000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r4, 0x600, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x8, 0x81, 0x9, 0x6}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x44000}, 0x20000051) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000540)={0x68, r4, 0x420, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x7ff, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x4014) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) write$smack_current(r1, &(0x7f0000000600)='-nodevem0\x00', 0xa) 12:00:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000540)=0xfffffffffffffffc) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:30 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:30 executing program 5: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f0000000540)={0x7ff, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e21, @rand_addr=0x8319}}}, 0x108) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000002c0)) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000080)=0x8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:31 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/fib_triestat\x00') exit(0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x2}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1, 0x100000001}, 0x8) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) bind$isdn(r1, &(0x7f0000000140)={0x22, 0xfffffffffffff1a2, 0x2, 0xffffffff, 0x8b0}, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:31 executing program 0: creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:31 executing program 5: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000080)={0x3}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:31 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) getgroups(0x1, &(0x7f00000001c0)=[0x0]) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) write$P9_RSTATu(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="5e0000007d020000004100000007000000c4040000006c0000000000000000000004000000000000000036000000000000000200635d06007663616e3000000006007663616e300008006769645f6d617000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4], 0x5e) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', r1}) 12:00:31 executing program 5: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:31 executing program 0: creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:31 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') rt_sigaction(0x2, &(0x7f0000000080)={&(0x7f0000000000)="c4a1fa11bf1ff7f72a438423830a00660fdf760240dbe3c4e11d5d6cad7c3e6436410fed0cadf30000003e36de1c6a8fa97001d6c684d30400000019", {0x5}, 0x8000000, &(0x7f0000000040)="c4e2292995595d0000c4c1b162038fc9b8970bf3420f59c8c4a119c2490eb94c0fae4109c402d10b56e22e66cbc4837bf0af08000000d3dbf7"}, &(0x7f0000000240)={&(0x7f00000000c0)="65440fdabf98ce4dd2c4c1f56269370f0d74f17845d2810000000043dbd3df720ac4837d088534d71eba0f47da6bae66450f91745808c4018973dc89", {}, 0x0, &(0x7f0000000100)="360f567693c4820192bcd9e2000000c4e3416f4dd503c4e17e7f94ca0e1500000f1b2fa5c4a279ab36673e660f6a4cd778c4a179299a25000000c422ed3c2cd8"}, 0x8, &(0x7f00000002c0)) 12:00:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000002c0)={@empty, 0x14, r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) munlockall() r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000200)=0x8, 0x1) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000540)=[@in6={0xa, 0x4e23, 0x2, @mcast2, 0x80000001}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x4c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0xffffffffffffffc1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x4a7a9e51, 0x20}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000002c0)={r4, 0x20}, &(0x7f0000000440)=0x8) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:32 executing program 0: creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$SIOCX25GFACILITIES(r3, 0x89e2, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYPTR64], 0x8) 12:00:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000080)={0x3}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:32 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(0x0, 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x3) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000140)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x4, 0x2, &(0x7f0000000480)=[{&(0x7f0000000380)="88db62f58436c23e3416bce5e0bb8450ebd35f02ce1d6180987586b180ece9b01be393acfe912bef66febc8375b30877821f67efd7a333", 0x37, 0xd2}, {&(0x7f00000003c0)="b5319fc27dbee75d1a379743353382bdd6dd1acd438d7e021a64b3bac80899d7ea20446a59bcb62d0a90cf7125965ee54a628f974193ab546ba9525457d1b8f98271e0da5271c118eb1db99582b5e8efdccf2aa01e029ad04dba3e577442f407659a26bd7feaaf6143a9c260a9edcf066fe8e5364e7a7460a200173d8088dd6d8521b59bc34bcf7174c5ce08cb7a06305300b750e959b94119062adac42d4ee26d96d8856a", 0xa5, 0x1f}], 0x20, &(0x7f0000000600)={[{@nls={'nls', 0x3d, 'cp775'}}], [{@obj_type={'obj_type', 0x3d, 'em0'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-'}}, {@uid_lt={'uid<', r4}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}]}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:32 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(0x0, 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000080)={0x3}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={@null=' \x00', 0x4, 'teql0\x00'}) munlockall() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x40000000, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) getsockopt$ax25_int(r1, 0x101, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:32 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000000)=0x3) 12:00:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000380)) sendmsg$kcm(r1, 0x0, 0x816) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="d3abc7990d535c9e70bc111c8eff7f00", 0x10) removexattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@random={'trusted.', 'raw\x00'}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$P9_RFLUSH(r1, &(0x7f0000000480)={0x7, 0x6d, 0x2}, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={r0, r0, 0xf, 0x1}, 0x10) 12:00:33 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(0x0, 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x1) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[], 0x3a3cf329a03a14b) 12:00:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000080)={0x3}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:33 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x110, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f00000002c0)={r5, &(0x7f0000000380)=""/229}) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000380)) sendmsg$kcm(r1, 0x0, 0x816) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="d3abc7990d535c9e70bc111c8eff7f00", 0x10) removexattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@random={'trusted.', 'raw\x00'}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$P9_RFLUSH(r1, &(0x7f0000000480)={0x7, 0x6d, 0x2}, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={r0, r0, 0xf, 0x1}, 0x10) 12:00:33 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000540)={'raw\x00'}, &(0x7f0000000080)=0x54) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) [ 377.412166] audit: type=1400 audit(1556280033.714:56): avc: denied { map } for pid=18675 comm="syz-executor.1" path="/selinux/checkreqprot" dev="selinuxfs" ino=15 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 12:00:33 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000100)={r1, &(0x7f0000000080)=""/95}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000140)={@dev, 0x0}, &(0x7f0000000180)=0x14) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r2, 0x1, 0x6}, 0x14) exit(0xffffffffffffff82) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) r4 = syz_open_procfs(r3, &(0x7f0000000940)='net/ip6_flowlabel\x00') ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)=0x400000) 12:00:34 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:34 executing program 5: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:34 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') r1 = shmget$private(0x0, 0x3000, 0x804, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000080)=""/108, 0x6c) exit(0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, 0x0, 0x4008054) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:34 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x1) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[], 0x3a3cf329a03a14b) 12:00:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000140)={r5, 0x80000, r2}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd62704000000b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bba65f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd20000000000000000"], 0x11f) 12:00:34 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x1) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[], 0x3a3cf329a03a14b) 12:00:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, 0x0, 0x20001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140)={0x1, 0x4, 0x7, 0x80000001, 0x5}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0) 12:00:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:35 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:35 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') ioctl$BLKFRASET(r0, 0x1264, &(0x7f00000002c0)=0x3) exit(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x113, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in={0x2, 0x4e22, @rand_addr=0x8}}}, 0x90) write$P9_RRENAME(r0, &(0x7f0000000340)={0x7, 0x15, 0x2}, 0x18a) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000380)={{0x2, 0x4e21, @empty}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x5c, {0x2, 0x4e24, @rand_addr=0x5}, 'netdevsim0\x00'}) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0x100, 0xdc, {"90bd106de4bf1485987be48eda79a2f9d7a93dabc3784fe5160a255ef02e4ffb93159622dbff91d7998297a2497c05162122c604515b470db50bae955121658962c2e2645010103f4be7029f895857d2bb078eea2322892925baba9e3ced0b2e2eac13a2ef4d4c940e6c7fd17fbb9cfcd1604a32f6473132d81891d61733a3e8eddd8f5ac24a315d947004ed8a73b9d2f7b8b21a0a12ed5228209f1c84a4a3356815bcadf80ac20d25648189eb9310b9d9da1cd8c8bdf54d66c62745237d4533284c87a6a551dc1a4e5d8bc6c7b94230ffe2cbc9fd629f8515f82be64172d308edb2b9f11f2e"}}, {0x0, "417fcb1759e099b52a22a1c1ad1ebe0f8b43359f27df27b069afe1fb6421af98a6a936c8bddce2ae596103df1e4590797d11cdd7eed7a86443690667a5"}}, &(0x7f0000000680)=""/185, 0x13f, 0xb9, 0x1}, 0x20) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r4, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000004060501fffa205d287e64deeb0000800c000100060000007d5572000c000200ff0022ff02f10000"], 0x2c}}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:35 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000540)={'raw\x00'}, &(0x7f0000000080)=0x54) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:35 executing program 3: r0 = getpid() syz_open_procfs(r0, &(0x7f00000000c0)='gid_map\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:35 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000480)={0x0, 0x2, 0x2, 0x7}, &(0x7f0000000780)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000900)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000800)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000680)={r4, 0xc9, "5da4c780cc641956c6ab4193ad8b11ac132b900954dd5b4b90671bc6de31d2aede2e520db23a16be3dc56d86db6728d8cf9bde0fed42f905de0f1baaa77ce640fc6f8b7e069980d19250c2178f6f682b8d26eb1cdd6d2f494c19c69ec50d0f188741e3a913d35feea50500d2fb2f406cfab6bbd13a4d1e9eb325da58a8f52aaaebe3b1c1cc838f6cc4f51a0897db6b377023f94a2f0a6a8a6b96116eb9914fbfd2f79f91a0d805f378b0e16e25bc519f4e52b9f2ccfa595bc8c033c7131b3d71896238bcd616360f48"}, &(0x7f0000000080)=0xd1) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000002c0)={0x1, 0x1, 0x400, 0x3, r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x11f) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000440)={0x2001}) 12:00:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000380)={0x9, 0x80, 0x6, 'queue0\x00', 0xbf}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000140)={0x4, 0x0, 0x10001, 0xa3}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f00000002c0)={0x5, r4}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000540)={'raw\x00'}, &(0x7f0000000080)=0x54) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x11f) 12:00:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000700)={&(0x7f0000000100), 0xc, &(0x7f0000000500)={&(0x7f0000000680)={0x74, r5, 0x200, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8b5}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xcda9}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x35d24fa4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}]}]}]}, 0x74}, 0x1, 0x0, 0x0, 0xc0}, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000540)='security.selinux\x00', &(0x7f0000000580)='system_u:object_r:hugetlbfs_t:s0\x00', 0x21, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000740)=0x1) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000005c0)={'r\tw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc4$\xf6~\xb7\x84t\xc1\x00'}, &(0x7f0000000640)=0x23) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39ddd841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652171cb7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6552ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x11f) 12:00:36 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000540)={'raw\x00'}, &(0x7f0000000080)=0x54) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000040)='io\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(r1, 0x0, 0x4000) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f00000002c0)=0x84) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x9, 0x480000) 12:00:36 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:36 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x280, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r0, &(0x7f0000000040)="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", &(0x7f00000002c0)=""/212}, 0x18) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000280)) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000003c0)=ANY=[@ANYBLOB="0102ffffffffffff0180c200000180c2000003aaaaaaaa6140aa7e000f0000000000"]) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0x44002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000540)=""/206) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000080)=0x1, &(0x7f00000002c0)=0x4) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000006c0)={'raw\x00'}, &(0x7f0000000680)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x11f) 12:00:36 executing program 3: futex(&(0x7f0000000080)=0x1, 0x3, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000100)=0x1, 0x2) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x2000000000000100) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x7, &(0x7f0000000000)='system\x00'}, 0x30) syz_open_procfs(r1, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000140)=0x1) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0x2000000) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000380)={0x6}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:37 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, 0x0, 0x20001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140)={0x1, 0x4, 0x7, 0x80000001, 0x5}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="2963099ecf183aa95749bc72137980fa2e4e03e6f979491ba2005018463baa51b1e0b2417428d05a1f9ae001dce607c7a09ba83e44deaced11824725e62e92b855c5990f2837f1b673d1d401903bf56d0d49994d53fcfc08957e8c0b661b00fd3c6244975f1b90022a3733ad466658ea00de1ca4e61095ff0f8d8c5efd6b23623c21000ddd7e0d83dc8022fb5a4032a9b121e1335ceb4c0cb19ac3e0260359adefa2cc0d805710651e0d7e99ea987231df524d6864b401000000000000007fe0b24136ccee8b7549be53dd4b7a26711ab2a49effc3feca633b3bb0e12a2a5a6e7ece412fd858e223bc117c12af43f0305d1bbdc7fd4a2676fe7d0a15770c5248a78160415646f0f607d02a39de57ce845d9c05f7b89b0de2d6d0391e608f041d70f859e0a58b"], 0x0) 12:00:37 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) fcntl$setflags(r0, 0x2, 0x1) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:37 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, 0x0, 0x20001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140)={0x1, 0x4, 0x7, 0x80000001, 0x5}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0) 12:00:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'vlan0\x00', 0x0}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f00000002c0)={r3, 0x1, 0x6, @broadcast}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20244}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r4, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x8000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$kcm(r1, 0x0, 0x890) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:37 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:38 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') r0 = msgget$private(0x0, 0x400) msgsnd(r0, &(0x7f0000000000)={0x3, "69143f28"}, 0xc, 0x800) 12:00:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:38 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f00000003c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000080)='r\x00'/13, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f0000000200)={0x0, 0x0, {0x2, 0x9, 0x2007, 0x1, 0x6, 0x7, 0x3, 0x6}}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r1, &(0x7f0000000700)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06cc0865f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d24b8a3843bfe077bb8100c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e45c2f53ab7bb63987b0a03c88e33085"], 0x11f) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000540)="ad8a86221c6c4d08f13090ab448840426264958f7b255817e8c2ade47fb6fc09cb2e35d7b5403fd3ba1a02ea11e924538b5faa67418eefc53b184ffa3fac26ba2806cac197980ec1e3517c23f8e99013c78d5a6b91e53dcdff8f59110522823f2a95f3a1", 0x64}, {&(0x7f00000005c0)="ee48cb162d3abd873300c37eaa90cb23618e5fc4d82f18ab00c89782379cf2fd056d477b68985225873d445daaeb15c813c69c413458554c80568c3291e2b0805c483e169d5248628b39b8a85498c509e33f1591ae4de549868baadcfde16eae96b69e103b98209703ec05cd9ca0b5e72ff99c0f4fe4833de1aa7a1fefa0019c04dc9fa0ebc6412e5ca0e6cf533ca9ab8c8cd3be29e16b50bd96d7a902fa7e45bdd5047fc23ea320106ad32aa77771cfcda7901479f1492b225106d7d7554f5a12ba6a4b0406ad1007bfd2cb3fa2a74fd3b8466ade4df8c2f321ddf81396d8ddb1", 0xe1}], 0x2) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000280)=r2, 0x4) write$USERIO_CMD_REGISTER(r4, &(0x7f00000002c0)={0x0, 0x7}, 0x2) 12:00:38 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = request_key(&(0x7f0000000480)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='vmnet1ppp1cgroup\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000540)="db3effde43b976d352fe5657f4351318b0a330ee0d027735c49be1abf1cf6fe2f5c0401dfb9ab898c1128f2f291d910793dfd94e2bf7fa12d120fafc48c05df93de7ff2e703281e06fe7a37ea9667e8c6d4b391f5d075e91a17cae2b9555891a00b81c9908c56f0c388e4fcc82ade2a30d5e909f33a6235db6c1acd777760526566e8a779953e0233b3b4d6233a2200596da94cabd904ed20df27cdaac25e9ccde8d4d457bc8f201a1ef6e8f8719dbf75fe9b2f79a20892e9817eefeec38bfdcd8a3b364b5ea922dc2fd4756b15ca20ecd46b8737cc6fdd58129aa483d2303176d55ed1f5b3a0f70915e83f59d64a4c2d6e4774bffff069f", 0xf8, r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x2, 0x400100) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000380)={0x8, [0xd1d08d1, 0x5, 0x8, 0x2, 0x10001, 0x8, 0x1, 0xfffffffffffffffe]}, &(0x7f00000003c0)=0x14) 12:00:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000540)="a07d61263d54b507dd1d018462b8bd84412a946ca9054b38c3da54b5651b3b3f99badfa4658b9d385b9d82a1a0a13d4707d26452ff0507db9380abdbbb0b80798b826951015bcf68d9817b2c95a5d75fea3d584247d815ea4399fd197baae471", 0x60) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:38 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x81, 0x7eac8638, 0x0, 0x0, 0x0, 0x10001, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() accept4$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000380)=0x1c, 0x80000) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000140)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:39 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:39 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x2, 0x6}) 12:00:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:39 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000380)=""/195) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="6f05d812760436"], 0x0) 12:00:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000080)) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f0000000540)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={'rose', 0x0}, 0xff, 'syz1\x00', @default, 0x3, 0x1, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) 12:00:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000540)="a07d61263d54b507dd1d018462b8bd84412a946ca9054b38c3da54b5651b3b3f99badfa4658b9d385b9d82a1a0a13d4707d26452ff0507db9380abdbbb0b80798b826951015bcf68d9817b2c95a5d75fea3d584247d815ea4399fd197baae471", 0x60) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:39 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:40 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000540)="a07d61263d54b507dd1d018462b8bd84412a946ca9054b38c3da54b5651b3b3f99badfa4658b9d385b9d82a1a0a13d4707d26452ff0507db9380abdbbb0b80798b826951015bcf68d9817b2c95a5d75fea3d584247d815ea4399fd197baae471", 0x60) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x108) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f00000002c0)={0x1, 0x4, 0x10000, 0x4, 0x100000001}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x77e) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:40 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xa037, 0x400980) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x9980ccf1918e1f3c, 0x0) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x8) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:40 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$sock_proto_private(r2, 0x89e6, &(0x7f0000000380)="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") getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'security\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="024f1b3b5347b9292aae793709e86c729643df0f1131b155ebb45c9c1d6f3233bbdf337fba690b1e379cd21aea12f9d03a7a6945a5ab2cb8e79b1b672b61fe78e515a37fe6c00e38e0fbfe6a523ffe1f59113c611b257656480a7fc29de57b408f0042f37b217929d601688072e5bcc9ff78df2e401d4385bf606bc046d5f26baa1fe0db7e5d69ce4a3f96625558636f397d056199e6cabc738789cb7bb11f0f8900272df22ef73d8e63ea2cf0c618530fcc"], 0x0) 12:00:40 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:40 executing program 5: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x48084, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@mss={0x2, 0x5}, @mss={0x2, 0x3d1}, @timestamp, @window={0x3, 0xffc000000000, 0x1}, @window={0x3, 0xe10, 0xfffffffffffffff9}, @mss={0x2, 0x733a}, @mss={0x2, 0x7}, @window={0x3, 0x5, 0xbc}], 0x8) 12:00:40 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:41 executing program 3: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c) r1 = syz_open_dev$radio(&(0x7f0000000400)='/dev/radio#\x00', 0x3, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r2, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x800) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'gre0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="1b00000002000000780008f00adf79aae434d9040000a329da00f254308c4fbbf3f86d0d931e17bfe2d666d8b1b9af8466b25d5396227430eeca425ed39d48221d74b978856bcbfa1d3ca5dfa60ca8f38d44709b5f17c2a63c5f9e550c841d6320bb2a0f7cd9e2f322805128b80a3799d74ccda9c438fa4fcf77df9a186279fccdd9a6d9"]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r4, 0x200, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x4801) 12:00:41 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:41 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000380)={0x6bf, 0x0, [], {0x0, @bt={0x41f5, 0x4, 0x1, 0x3, 0x2, 0xfffffffffffffffd, 0x9, 0x8, 0x5, 0x3, 0x4, 0x1, 0x9, 0x6, 0x2, 0x7}}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0xfffffc82, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="1136208702abba", 0x7) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:41 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000100)=0xffffffc4) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:41 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000140)='io.stat\x00', 0x2761, 0x0) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000240)={0x8, 0xa, 0x4, 0x10000, {}, {0x5, 0x2, 0xffffffffffffffc1, 0x80, 0x80, 0x6, "97d8dc34"}, 0xb4, 0x3, @userptr=0x7f, 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000200)=0xfffffffffffffe1b) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:42 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$CAPI_INSTALLED(r0, 0x80024322) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040)={0x6, 0xfffffffffffffff9}, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilt\xe5\x8c6\x00') 12:00:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) getsockname$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000002c0)=0x1c) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:42 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) accept$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000480)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000540)={{{@in=@broadcast, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x11}}, 0x4e24, 0x0, 0x4e21, 0x4, 0xa, 0xa0, 0x20, 0xff, r3, r4}, {0x6, 0x80000001, 0x1, 0x8000, 0xc17b, 0x40, 0x4, 0x4}, {0x7, 0x3, 0x4, 0x400}, 0x80, 0x6e6bb0, 0x0, 0x1, 0x1, 0x3}, {{@in=@local, 0x4d2, 0x7f}, 0xa, @in=@empty, 0x3507, 0x3, 0x2, 0x3, 0x4, 0x8, 0x4}}, 0xe8) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="1136208702abba", 0x7) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:42 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x800, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f00000002c0)={0x80000000, 0x5, [0xfffffffffffffffb, 0x7fff, 0x7, 0x58, 0x4], 0x2}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) readv(r0, &(0x7f0000000740)=[{&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000000400)=""/69, 0x45}, {&(0x7f0000000480)=""/20, 0x14}, {&(0x7f0000000540)=""/184, 0xb8}, {&(0x7f0000000600)=""/111, 0x6f}, {&(0x7f0000000680)=""/165, 0xa5}], 0x6) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:42 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="1136208702abba", 0x7) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f00000003c0)=0xf26) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:42 executing program 0: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:43 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') getsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f00000005c0), &(0x7f0000000600)=0x4) exit(0x15) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)={0x1, [0x7fff]}, 0x6) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000)=0x79a0, 0x4) getpeername$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f00000003c0)=0xe8) r3 = getgid() fstat(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000580)=0xe8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x20000, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000170000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,allow_other,blksize=0x0000000000000800,allow_other,allow_other,func=FILE_CHECK,pcr=00000000000000000012,euid=', @ANYRESDEC=r4, @ANYBLOB="195200000000000000595f57524954452c646f6e745f686173682c657569643cfd026f06ec0a9f1bc87ace62632ae660c0371dbbd58a1124d597c5ec631fb9581cf6c9c815707756e12df2efca7ac340057d5717df22806f4ccbab6e422c9b0300000000000000e3be81285bbcc5cd1cdf24e23df97721f7a511e5c84e33c76907", @ANYRESDEC=r5, @ANYBLOB=',pcr=00000000000000000040,defcontext=sysadm_u,\x00']) 12:00:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000000540)=""/142) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:43 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080)="1136208702abba", 0x7) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000001c40)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10011424}, 0xc, &(0x7f0000000280)={&(0x7f0000000680)={0x1594, 0x4, 0xa, 0xc03, 0x70bd26, 0x25dfdbfe, {0xb, 0x0, 0x4}, [@nested={0x264, 0x68, [@typed={0x8, 0x52, @u32=0x101}, @generic="fe71aa3e465e9fc149dfb513a0f1fdedacb6b3928775146e5e85fec9051b521dface650a9896b4b422d14b281f7207b2fd9f7ad155b80d9efb49e5d93d9c807fd89f173cffa98ff8a9185da0a2d2b6b9e07ede0905ce1577d645c6b4e61568aa203ba4fab20c3079d4ae484ef79fde18e3aa85cbcbb1d8b3ce20426a65257b56bdc799644a4b17cbd0862ff723d70bf07e81c2dc29a50b8a36f2530e9e87e08cab7a1353baea0d5d5eb8b162f4cc0f14b22bdb7795df58bffe1d3e7935abe72a74f5df2309d806beea17b92a8a4939d404", @typed={0x80, 0x0, @binary="0b40b9c5d7056d70a469dbffa74f0b6546254d6b7bf90639e7aac8d55977d02e8c1746265b13abbb012056afd1b61e53fd3803de04e77060e7d708170d7915cfaeb324f61be4ebe1a89e15175f115549142c1aae25510226e627d5e2de65911a29e8dee0bc6c61ab0ee71f198b9e168c5c40853dce87c68ab837fac7"}, @generic="2fbfb725ed869bfdff95b1e2eb4ac1d854909d80f00cfdbfede885957d58df39cf128135437020c01225d9f9d12f9509e93f2562f15858e6b41c23c3f596380874a3aae3ff150612c04cc866950a2282299196dd1151c75f06bd86cc5c8c4b70ec0952238941f21727098a4eeaad4c2cfd2518036d59275c453e60deb9da", @generic="ba1fbbc484891e1bdf092bb35a21d5c1a383b324ea367a5c6988b509dc7b6679073baeaa083bea60cb55f7edcd33bb39898a669da6b64ad67ab83f263c2375d33cf775eb020584b6e017282f50e284bfa1e0286b7597417f56840dff2ff64c4d4c3686ce92fc24b9d303f7b843454a04bd28", @typed={0x14, 0x18, @ipv6=@rand_addr="40a2d19d5d563b3f3204d116d6bb1187"}]}, @generic="b0b4129a3d4e90870ac5514ad0c0a25aabf09eebda63ca857f3a4aa02a2a61ef8488e8410f9b9167dee697cc787ae326dca5e2caf86f23b4c6b2bb9eae95a81776609de093e41bc61adede6c4fe93610a7fe88328c6c59b8cab646303a94bee4a9313c6ceb77e2f2ba6301b8cd8f97634b93592b21c1c18f8a77aa8a61dc5495922bac42054cfa448414b5e94d75e45f2a6340d06549ce1654961367942dc96ed44bc25d341662f6aaaeb6eceb71356f347190119b956ee053befe1153dd9f5e86304af06f296a015f4ae15da95f8f", @generic="ff70e307e6e83283b44e3a5c93739aa202c799350c639bd9512f1374d61b044e2a1c394376d77ae788bfc0eb3edad57c613eac9f19dcd92ee43426579845f4a7cff6861ef72e9d2224629f19d4ce745a15f0ee014af15a6219b03144534acd644555a2bba97886f77235e204d624ab19736a9083275aae8e5bf01cdd545f3d64e638dd9379cca80629a045a479d490970b85f17954df4e470e256909a64019eda15c2cfd9dbc", @nested={0x1174, 0x86, [@generic="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", @typed={0xd4, 0x2e, @binary="a05af3049ca333d6a7b08e333dee3beac2fb8c4867611f8cface72784f2385c4416088e224902676fd9076b749b0030e832b2df55db624e7b36c1dc1fd5f0733bedd49d09d87de7a3c1e38e7adbd40ad59a05d92ff189dac106e15702595b60932b994c7b4ebbfb30e664a2c91bec4b58491742581e953fab58b3d75c07cd36287c34c078855ffb9b09994cc39fd432d00cb68729e6cdf819ee9e752a57eb7c00785b8aa7923f0c303210dc0ec33b7e792eda6824ef106b17a5ecaece7ded8c3459f914c1718530f57f4cb6851"}, @generic="1c8066816130a6543f9ac00085e094d59299d7f4c18bed5563972f8feb3af560de01058df969a281a2e12a59474fcc82a0ff07839a69dc49a60144c095a42793fcd53bc777cc84c65e780bd221112853a44318ecabea2b23e269b3bb32bdb6d5707c61b0f969efec4bd7b14ffd6af1d1e9384c504e87bdbb7f1d1982e5575ecb4735cd52001d8f4dbeb5d9ee2220a3f4221dbb04f665fbf242420d"]}, @nested={0x8, 0x4a, [@typed={0x4, 0x7}]}, @nested={0x28, 0x6c, [@generic="b938aa2bf3f971399014e018e914f8d46fddec6b007fd1d9263698cd1c2170e14376f0e6"]}]}, 0x1594}, 0x1, 0x0, 0x0, 0x4000040}, 0x8000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r4 = geteuid() getresgid(&(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000380)=0x0) write$P9_RGETATTR(r1, &(0x7f00000003c0)={0xa0, 0x19, 0x2, {0x20, {0x80, 0x1, 0x5}, 0x81, r4, r5, 0x400, 0x9, 0x9, 0x1, 0x3, 0x27, 0x80000001, 0x1, 0x401, 0x80000001, 0x0, 0x7, 0x2, 0x1, 0x522cb0d8}}, 0xa0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) r6 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r6, &(0x7f0000000580)='cifs.spnego\x00', &(0x7f0000000640)=@chain={'key_or_keyring:', r7, ':chain\x00'}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:43 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:43 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) openat$cgroup_procs(r3, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f00000003c0)=0xf26) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'se\x8c\xee\xc8\x0fpy\xd5g\x00\x00o\x01\x00\x00\x00\x01\xefq\t\xd9\xd5A`\x00D\x02\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:43 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:43 executing program 5: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:43 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000080)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x11f) 12:00:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) mlockall(0x1) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:44 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) 12:00:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) openat$cgroup_procs(r3, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000080)='.\x00', 0x100, 0x7ff, &(0x7f0000000540)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:44 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) 12:00:44 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) 12:00:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000540)={'raw\x00'}, &(0x7f0000000080)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:44 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) 12:00:44 executing program 5: r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(r0, 0x10, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 12:00:45 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 12:00:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$sock_proto_private(r2, 0x89e6, &(0x7f0000000380)="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") getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'security\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="024f1b3b5347b9292aae793709e86c729643df0f1131b155ebb45c9c1d6f3233bbdf337fba690b1e379cd21aea12f9d03a7a6945a5ab2cb8e79b1b672b61fe78e515a37fe6c00e38e0fbfe6a523ffe1f59113c611b257656480a7fc29de57b408f0042f37b217929d601688072e5bcc9ff78df2e401d4385bf606bc046d5f26baa1fe0db7e5d69ce4a3f96625558636f397d056199e6cabc738789cb7bb11f0f8900272df22ef73d8e63ea2cf0c618530fcc"], 0x0) 12:00:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0xa4f) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x11f) 12:00:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000140)={0x0, 0x0, 0x6, 0x8, 0x558e2ccffb096eef, 0x4}) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) listen(r1, 0x200) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:45 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') lsetxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:apt_exec_t:s0\x00', 0x20, 0x3) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000010}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40081}, 0x4000044) r2 = gettid() syz_open_procfs(r2, &(0x7f0000000440)='attr/keycreate\x002\x8eI>\xbb\xcf\x83\xbb7+\x91C\xe1\b\xa1i\x93\xf7\x0eL\xaeBP\xf8U:\xfeV\r\xd4\x03\xef\xac\xa7o8\xf8d\xde\xd6\xaa\x98\x98\xfc\xbf\t\xa5\xee\xf4i\x93\x94\xa9n\xd5\t\xf1\xbf\x99\x80\xd9\xd2\x84\xde\x1f\xd3/odN\xfef\x9dZ\x86\x17\x8e\x18Z\x9f\xe0\xed\xef\x03O\xa6o\xfd\x83\xdb\x81.\xf34\xe6\t\x89b\xa9P\x80=vj\xc0I\x9b\xad\x94e\xe94\x9f<5>\x00'/141) 12:00:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:45 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 12:00:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) mlockall(0x1) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f26576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d875031aa890bbe52308afe16655ecf88e4e2e24bbad39d9dffd69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea00"/300], 0x11f) 12:00:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f00000002c0)={0x5, &(0x7f0000000140)=[0x2, 0x2, 0xfffffffffffffffd, 0x4, 0x6]}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:45 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 12:00:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:45 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) 12:00:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x1000000000000125, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:45 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) 12:00:46 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000080)='gid_map\x00') r2 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={r0, r2, r4}, 0xc) ioprio_set$uid(0x3, r3, 0x3) exit(0x7) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000000)={0x1f, 0x0, 0x2, 0x2}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000040)={0xcd9, r5, 0x10000, 0x3}) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:46 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) 12:00:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000380)={'ip6erspan0\x00', 0x2, 0x4}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() epoll_create1(0x80000) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(r0, 0x0, 0x47fff) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000800)={&(0x7f0000000700), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r3, 0x2, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c000}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000840), &(0x7f0000000880)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) r5 = openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000380)={0x0, 0xffff, 0x2e02, 0x4, 0x0, 0x7, 0x2, 0x4, {0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0x200}}, 0x2, 0x2, 0x81, 0x8, 0x8000}}, &(0x7f00000002c0)=0xb0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000440)={r6, 0x1000}, &(0x7f0000000480)=0x8) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2fa0eb7c759ba2ecad66f6681417eb078640bcb9c5b246d7b7567e374b11bbe60c0178b93208cb2b6780862721ba89c5e2ace1f039d3c8585a45d3dee5ebd6d193fa86e8c09ce6f1dc3113e3e03f125bf2191bf134716765fc5a4838f00ebca34e7a1861732303cb6bdbf7eea2e7f005449f0d8b72d058271d13f8fe6217847c4d217bc6aadf9ceb4f3458c"], 0x11f) 12:00:46 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2d46}, {0xa, 0x4e24, 0x8, @remote, 0x3}, r1, 0x4b5}}, 0x48) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:46 executing program 0: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) 12:00:46 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') recvmmsg(r0, &(0x7f0000004d00)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)=""/37, 0x25}, {&(0x7f0000000140)=""/105, 0x69}, {&(0x7f00000001c0)=""/59, 0x3b}, {&(0x7f00000003c0)=""/202, 0xca}], 0x4, &(0x7f00000004c0)=""/149, 0x95}, 0x10001}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000580)=""/74, 0x4a}, {&(0x7f0000000600)=""/233, 0xe9}, {&(0x7f0000000700)=""/202, 0xca}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/93, 0x5d}, {&(0x7f0000001880)=""/177, 0xb1}, {&(0x7f0000001940)=""/4096, 0x1000}], 0x7, &(0x7f00000029c0)=""/103, 0x67}, 0x57a}, {{0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f0000002a40)=""/208, 0xd0}, {&(0x7f0000000240)=""/4, 0x4}, {&(0x7f0000002b40)=""/197, 0xc5}], 0x3}, 0x4a}, {{&(0x7f0000002c80)=@x25={0x9, @remote}, 0x80, &(0x7f0000003340)=[{&(0x7f0000002d00)=""/31, 0x1f}, {&(0x7f0000002d40)=""/219, 0xdb}, {&(0x7f0000002e40)=""/254, 0xfe}, {&(0x7f0000002f40)=""/151, 0x97}, {&(0x7f0000003000)=""/244, 0xf4}, {&(0x7f0000003100)=""/188, 0xbc}, {&(0x7f00000031c0)=""/173, 0xad}, {&(0x7f0000003280)=""/134, 0x86}], 0x8, &(0x7f00000033c0)=""/77, 0x4d}, 0x8}, {{&(0x7f0000003440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000003700)=[{&(0x7f00000034c0)=""/94, 0x5e}, {&(0x7f0000003540)=""/184, 0xb8}, {&(0x7f0000003600)=""/54, 0x36}, {&(0x7f0000003640)=""/133, 0x85}], 0x4, &(0x7f0000003740)}, 0x8}, {{&(0x7f0000003780)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000003800)=""/180, 0xb4}, {&(0x7f00000038c0)=""/38, 0x26}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/206, 0xce}, {&(0x7f0000004a00)=""/17, 0x11}, {&(0x7f0000004a40)=""/54, 0x36}, {&(0x7f0000004a80)=""/11, 0xb}], 0x7, &(0x7f0000004b40)=""/74, 0x4a}, 0x3}, {{0x0, 0x0, &(0x7f0000004c00)=[{&(0x7f0000004bc0)=""/60, 0x3c}], 0x1, &(0x7f0000004c40)=""/178, 0xb2}, 0x80}], 0x7, 0x10103, &(0x7f0000004ec0)) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) exit(0x40000) syz_open_procfs(0x0, &(0x7f00000002c0)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') fcntl$setpipe(r0, 0x407, 0x4000000000000006) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000003740)={r0, 0x1}) 12:00:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) sendmmsg$nfc_llcp(r3, &(0x7f0000000140), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:46 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x7b, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000002c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f00000002c0)={0x5, &(0x7f0000000140)=[0x2, 0x2, 0xfffffffffffffffd, 0x4, 0x6]}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000380)={{0x6, 0x3}, 'port1\x00', 0x2, 0x0, 0x0, 0x3f, 0x7fff, 0x1, 0x588a, 0x0, 0x7, 0xffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cp\x95ac\xd8_pe', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) sendto(r0, &(0x7f0000000380)="aa0f94a0d4e4cc5624a43ed16ed9639822d36202b2367afb52af091f0a2805b0afa8089b110e9139d55f7470ec1a8605bd1e48775fcd6132403810b03a7a2b0197fda57a440fb31c5c9963f1b686db1aeb3390bef5744fd564e5f198445f7614e85f705a5dd4f17c5953fc93f4d32cd515d21ae6c976c57e8559dfc1b1c38588583a2e545f98ce2be7fc19b91530551739896287a3e04ee3480cea0d4b5054635a380154ae8186171c7e239e5b83cd6c01bb6004f4365d9f41cc53dcadf6685b812c89c9bf54563d117eeb3985312379dc41928f9bfc135fdf", 0xd9, 0x10, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @multicast2}, 0x4, 0x3, 0x0, 0x2}}, 0x80) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f00000002c0)={0x5, &(0x7f0000000140)=[0x2, 0x2, 0xfffffffffffffffd, 0x4, 0x6]}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000640)={0x0, 0x80}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000006c0)={r2}, &(0x7f0000000700)=0x8) recvfrom$unix(r0, &(0x7f0000000740)=""/60, 0x3c, 0x3, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000007c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x30, r4, 0x710, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4094}, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2010010}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, r5, 0x0, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xffffffff, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:47 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x40000000002) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000a005000020040000c000000020040000c000000020040000080500000805000008050000080500000805000006000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/96], @ANYBLOB="ac14141900000000ff000000ffffffff626f6e645f736c6176655f31000000006970365f767469300000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007300020000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e00000000000000000000000000000000000000000000000000000020ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000018014001000000000000000000000000000000000000000000000000300061646472747970650000000000000000000000000000000000000000000019000a0800000000000000000000000050006d756c7469706f7274000000000000000000000000000000000000000001010a4e224e224e224e244e204e234e224e204e224e224e244e234e224e224e21010000000001010000010001000000012800544f530000000000000000000000000000000000000000000000000000007f06000000000000ac1414aaac1414aaffffffff0000000069706464703000000000000000000000626f6e64300000000000000000000000000000000000000000000000bf0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000002100010200000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000003000000000000007f00000004000000021c81d607615300000001000100060000004cff00000200000003000000ffff00000600000000000000050000000700000008fe000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000d4390000050000007a0f000009000000010400002e0500000200000006f800002800727066696c746572000000000000000000000000000000000000000000000400000000000000280054544c0000000000000000000000000000000000000000000000000000000231000000000000ffffffff00000000ffffffff000000006966623000000000000000000000000076657468300000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f0002050000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000200000000000000280045434e0000000000000000000000000000000000000000000000000000002006010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x600) 12:00:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/300], 0x11f) 12:00:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x11f) 12:00:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r4 = shmget(0x0, 0x4000, 0x200, &(0x7f0000ffc000/0x4000)=nil) fstat(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000140)=0x0, &(0x7f00000002c0), &(0x7f0000000400)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) getgroups(0x7, &(0x7f0000000480)=[0xee00, 0xee01, 0x0, 0x0, 0xee01, 0xee01, 0xffffffffffffffff]) r9 = getpgrp(0x0) r10 = gettid() shmctl$IPC_SET(r4, 0x1, &(0x7f0000000640)={{0x81, r5, r6, r7, r8, 0x12, 0x6a0}, 0x9, 0x7fffffff, 0xc4a, 0x8001, r9, r10, 0x10001}) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) sendto(r0, &(0x7f0000000380)="aa0f94a0d4e4cc5624a43ed16ed9639822d36202b2367afb52af091f0a2805b0afa8089b110e9139d55f7470ec1a8605bd1e48775fcd6132403810b03a7a2b0197fda57a440fb31c5c9963f1b686db1aeb3390bef5744fd564e5f198445f7614e85f705a5dd4f17c5953fc93f4d32cd515d21ae6c976c57e8559dfc1b1c38588583a2e545f98ce2be7fc19b91530551739896287a3e04ee3480cea0d4b5054635a380154ae8186171c7e239e5b83cd6c01bb6004f4365d9f41cc53dcadf6685b812c89c9bf54563d117eeb3985312379dc41928f9bfc135fdf", 0xd9, 0x10, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @multicast2}, 0x4, 0x3, 0x0, 0x2}}, 0x80) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) sendto(r0, &(0x7f0000000380)="aa0f94a0d4e4cc5624a43ed16ed9639822d36202b2367afb52af091f0a2805b0afa8089b110e9139d55f7470ec1a8605bd1e48775fcd6132403810b03a7a2b0197fda57a440fb31c5c9963f1b686db1aeb3390bef5744fd564e5f198445f7614e85f705a5dd4f17c5953fc93f4d32cd515d21ae6c976c57e8559dfc1b1c38588583a2e545f98ce2be7fc19b91530551739896287a3e04ee3480cea0d4b5054635a380154ae8186171c7e239e5b83cd6c01bb6004f4365d9f41cc53dcadf6685b812c89c9bf54563d117eeb3985312379dc41928f9bfc135fdf", 0xd9, 0x10, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @multicast2}, 0x4, 0x3, 0x0, 0x2}}, 0x80) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xe9f, 0xa8, 0x5, 0x2, 0xdc1c, 0x62c75e01}, 0x1000}, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000540)={'raw\x00'}, &(0x7f0000000080)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="4f2ccf0dea4425ad4cac50b64889222b3a47ea85d4e6b8d8efad8b5651ad7b3c71e90ffe6bf34ae3ab739375f568443b5e36391e2cc95dd25a4e8471f66b"], 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={0x0}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x4, 0x202, 0x8000, 0x10000, 0x8, 0x73, 0x7, r3}, 0x20) 12:00:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:48 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/dev_mcast\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') socket$netlink(0x10, 0x3, 0x4) 12:00:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:48 executing program 0: creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x11f) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000080)={'bond_slave_0\x00', 0x7}) 12:00:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:48 executing program 1: syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f0000000540)={0x7ff, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e21, @rand_addr=0x8319}}}, 0x108) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000002c0)) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000080)=0x8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x10f) 12:00:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f0000000540)={0x7ff, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e21, @rand_addr=0x8319}}}, 0x108) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000002c0)) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000080)=0x8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000080)=""/35) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$binfmt_elf32(r3, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x0, 0x8, 0x6a2, 0x9, 0x0, 0x6, 0x3ff, 0x3d6, 0x38, 0x2e3, 0x1, 0x9, 0x20, 0x2, 0x0, 0x3, 0x8}, [{0x6474e551, 0x3f, 0x100, 0x0, 0x401, 0x3, 0xc2, 0x113}], "d4f15a6e5da6b51cb0a5863d641a690db174ade5548f0e43792b175780f9437401305cfe5033a84fff723c088e4fa7ddee5386e0236051100bf2c96f8986df646c08ce112d971fa5b178a42fde746d656d554498b83724456a25b6eda527d89722e33ebe6ad0240328832272d1c8c71a4c95878fa0dab5b94f132753778d134d7591368d61c78bfd0eb7b1277ea0a313d0c4633fb7d13008b59cd6d65146b94447ab9d391005a47b5ffada39020e3e65c8c9a7065b2a8bb38b683285ffd76fc129cc", [[]]}, 0x21a) open_by_handle_at(r1, &(0x7f0000000540)={0x91, 0x1, "7bdb6d38c61a36b3f8c3e04727df386e3a43f8fef8c2cf6a3e46af83c5a6a1270003689a33942b96246ae3e374d1d1fd33fe8d31ea4356c64f2ad22619a66f024ecd9fe4271729d4ddf6a6630f27d9cbc209e757d4df206f97bb60153afd6ec1b1be2d69d73aa68dda97178458124ecb7d144471a876113a6f28bdc4e78cf6e982eabbfe4d4d66bfe4"}, 0x40200) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bbb5f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x11f) 12:00:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:49 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x400000000008001) r1 = fcntl$getown(r0, 0x9) r2 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/create\x00', 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000580)={'syz1', "f945cae2046e82b223056d436eb9ca5751"}, 0x15) process_vm_writev(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/128, 0x80}], 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)=""/226, 0xe2}, {&(0x7f00000003c0)=""/178, 0xb2}, {&(0x7f0000000480)=""/157, 0x9d}], 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000000)={0x80, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000040)={r4, 0x24}) 12:00:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, 0x0, 0x20000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f00000002c0)='syz1\x00') getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$int_in(r1, 0x5452, &(0x7f0000000380)=0x6) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x3) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="dcd0d8317a5219840d32d6a251ab9c47b280fa74ea29deec0453984bb941ab5dee98d06827e3084885fb74c6feddd2e3d94883ce127ebf866b65722c97"], 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000003c0)=0x1) 12:00:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:49 executing program 0 (fault-call:14 fault-nth:0): syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$NBD_CLEAR_QUE(r1, 0xab05) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:49 executing program 5 (fault-call:10 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad3"], 0x90) 12:00:49 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/netfilter\x00') exit(0x101) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') [ 392.903961] FAULT_INJECTION: forcing a failure. [ 392.903961] name failslab, interval 1, probability 0, space 0, times 0 12:00:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000140)={0x1}) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) [ 392.998956] CPU: 0 PID: 19746 Comm: syz-executor.0 Not tainted 4.14.113 #3 [ 393.006048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.015791] Call Trace: [ 393.018401] dump_stack+0x138/0x19c [ 393.022313] should_fail.cold+0x10f/0x159 [ 393.026744] should_failslab+0xdb/0x130 [ 393.031122] kmem_cache_alloc_node_trace+0x283/0x770 [ 393.036263] __kmalloc_node+0x3d/0x80 [ 393.040083] kvmalloc_node+0x4e/0xe0 [ 393.044114] alloc_netdev_mqs+0x7b/0xbc0 [ 393.048254] ? sl_free_netdev+0x70/0x70 [ 393.052335] slip_open+0x2f1/0xfb5 [ 393.055893] ? tty_set_ldisc+0x22b/0x610 [ 393.059970] ? sl_uninit+0x20/0x20 [ 393.063520] ? sl_uninit+0x20/0x20 [ 393.067076] tty_ldisc_open.isra.0+0x75/0xc0 [ 393.071522] tty_set_ldisc+0x29a/0x610 [ 393.075430] tty_ioctl+0x976/0x1340 [ 393.079073] ? retint_kernel+0x2d/0x2d [ 393.082986] ? tty_vhangup+0x30/0x30 [ 393.086715] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 393.091689] ? check_preemption_disabled+0x3c/0x250 [ 393.096738] ? retint_kernel+0x2d/0x2d [ 393.100643] ? tty_vhangup+0x30/0x30 [ 393.104389] ? do_vfs_ioctl+0x758/0x1070 [ 393.108553] ? tty_vhangup+0x30/0x30 [ 393.112633] do_vfs_ioctl+0x7b9/0x1070 [ 393.116542] ? selinux_file_mprotect+0x5d0/0x5d0 [ 393.121495] ? lock_downgrade+0x6e0/0x6e0 [ 393.125935] ? ioctl_preallocate+0x1c0/0x1c0 [ 393.130655] ? __fget+0x237/0x370 [ 393.134462] ? security_file_ioctl+0x8f/0xc0 [ 393.138899] SyS_ioctl+0x8f/0xc0 [ 393.142281] ? do_vfs_ioctl+0x1070/0x1070 [ 393.146709] do_syscall_64+0x1eb/0x630 [ 393.150614] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 393.155754] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 393.160970] RIP: 0033:0x458da9 [ 393.164179] RSP: 002b:00007f23ff969c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 393.171914] RAX: ffffffffffffffda RBX: 00007f23ff969c90 RCX: 0000000000458da9 [ 393.179470] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000005 [ 393.186972] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 12:00:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) openat$cgroup_int(r3, &(0x7f0000000080)='memory.swap.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f00000000c0)=0xfffffffffffffffe) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad3"], 0x90) 12:00:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/287], 0x11f) [ 393.195430] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ff96a6d4 [ 393.202729] R13: 00000000004c3215 R14: 00000000004d65a8 R15: 0000000000000006 12:00:49 executing program 0 (fault-call:14 fault-nth:1): syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) [ 393.338075] FAULT_INJECTION: forcing a failure. [ 393.338075] name failslab, interval 1, probability 0, space 0, times 0 [ 393.357058] CPU: 0 PID: 19773 Comm: syz-executor.0 Not tainted 4.14.113 #3 [ 393.364454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.376272] Call Trace: [ 393.378926] dump_stack+0x138/0x19c [ 393.382614] should_fail.cold+0x10f/0x159 [ 393.386796] should_failslab+0xdb/0x130 [ 393.390842] kmem_cache_alloc_trace+0x4b/0x790 [ 393.395460] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 393.401258] __hw_addr_create_ex+0x5e/0x300 [ 393.406009] __hw_addr_add_ex+0x1b8/0x280 [ 393.411337] dev_addr_init+0xfd/0x1c0 [ 393.415408] ? dev_mc_flush+0x40/0x40 [ 393.420437] alloc_netdev_mqs+0x125/0xbc0 [ 393.425244] ? sl_free_netdev+0x70/0x70 [ 393.429567] slip_open+0x2f1/0xfb5 [ 393.433223] ? tty_set_ldisc+0x22b/0x610 [ 393.437349] ? sl_uninit+0x20/0x20 [ 393.440924] ? sl_uninit+0x20/0x20 [ 393.446165] tty_ldisc_open.isra.0+0x75/0xc0 [ 393.450773] tty_set_ldisc+0x29a/0x610 [ 393.454693] tty_ioctl+0x976/0x1340 [ 393.458516] ? tty_vhangup+0x30/0x30 [ 393.462262] ? __might_sleep+0x93/0xb0 [ 393.466186] ? tty_vhangup+0x30/0x30 [ 393.471151] do_vfs_ioctl+0x7b9/0x1070 [ 393.475154] ? selinux_file_mprotect+0x5d0/0x5d0 [ 393.479934] ? lock_downgrade+0x6e0/0x6e0 [ 393.484124] ? ioctl_preallocate+0x1c0/0x1c0 [ 393.488576] ? __fget+0x237/0x370 [ 393.492167] ? security_file_ioctl+0x8f/0xc0 [ 393.497528] SyS_ioctl+0x8f/0xc0 [ 393.500935] ? do_vfs_ioctl+0x1070/0x1070 [ 393.505572] do_syscall_64+0x1eb/0x630 [ 393.510520] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 393.515380] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 393.521003] RIP: 0033:0x458da9 [ 393.524653] RSP: 002b:00007f23ff969c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:00:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400041, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) ioctl$ASHMEM_GET_PIN_STATUS(r4, 0x7709, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f00000002c0)=0xffffffffffffff0f) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad3"], 0x90) [ 393.533098] RAX: ffffffffffffffda RBX: 00007f23ff969c90 RCX: 0000000000458da9 [ 393.541335] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000005 [ 393.548787] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 393.556169] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ff96a6d4 [ 393.564403] R13: 00000000004c3215 R14: 00000000004d65a8 R15: 0000000000000006 12:00:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[]}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:49 executing program 0 (fault-call:14 fault-nth:2): syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="b84af2032f6e97633f11fccdd1f778aab832d194f077d85c48a14a97ce2c8276c0b2133f09add1838c74808b6cbdcf8f3eba563c3c228f414c7685e26a0870236a8fd0f41c751dbe78a0bc04a4f4c3eae7c8f85a0cb071e0c33ce50837d78b5b6b36dd3132bfcd405671763f7aecbfe6f366199c951dd59c31f60014f1328696bc1dcc6f0c24f302f95cf8e163653c4d27df453d3951003d208734e5acf0712c0e43356f3be8ae280e859ec6b1f9a728903cfb0aaeb6650f22cbc7a71476d25c85eddb58042d1c8a3adcecb1527e28fd89fea6f73dc878e4e828d01097902c0ee7f62e58a0c94740e91947f61b253961d1ebd7df8559a273cae999130af76e40a058a661ab0469b17c6a0c20ad9b16cf4eae117b746ba76a287b07e8b61e54d5941000670d930249275e492e980f689afbd7eecd07ce4bd11fd1712ba90d6b031894e08fca88f7a325476694ce5e888f3621bc8de0c514b826820295c078b2"], 0x0) chroot(&(0x7f0000000140)='./file0\x00') 12:00:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) fcntl$setpipe(r2, 0x407, 0x101) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x40000000000) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085128c176eea3971712671988cd2"], 0x11f) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x6d24, 0x4) [ 393.759724] FAULT_INJECTION: forcing a failure. [ 393.759724] name failslab, interval 1, probability 0, space 0, times 0 [ 393.779184] CPU: 1 PID: 19788 Comm: syz-executor.0 Not tainted 4.14.113 #3 [ 393.786361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.795854] Call Trace: [ 393.798471] dump_stack+0x138/0x19c [ 393.802306] should_fail.cold+0x10f/0x159 [ 393.806610] should_failslab+0xdb/0x130 [ 393.810905] kmem_cache_alloc_node_trace+0x283/0x770 [ 393.816043] ? __hw_addr_add_ex+0x1c0/0x280 [ 393.820532] __kmalloc_node+0x3d/0x80 [ 393.827503] kvmalloc_node+0x4e/0xe0 [ 393.832243] alloc_netdev_mqs+0x629/0xbc0 [ 393.836419] slip_open+0x2f1/0xfb5 [ 393.840636] ? tty_set_ldisc+0x22b/0x610 [ 393.845376] ? sl_uninit+0x20/0x20 [ 393.849068] ? sl_uninit+0x20/0x20 [ 393.853888] tty_ldisc_open.isra.0+0x75/0xc0 [ 393.859050] tty_set_ldisc+0x29a/0x610 [ 393.864238] tty_ioctl+0x976/0x1340 [ 393.868244] ? tty_vhangup+0x30/0x30 [ 393.872193] ? __might_sleep+0x93/0xb0 [ 393.876377] ? __fget+0x210/0x370 [ 393.879949] ? tty_vhangup+0x30/0x30 [ 393.883693] do_vfs_ioctl+0x7b9/0x1070 [ 393.887973] ? selinux_file_mprotect+0x5d0/0x5d0 [ 393.892754] ? lock_downgrade+0x6e0/0x6e0 [ 393.899559] ? ioctl_preallocate+0x1c0/0x1c0 [ 393.904012] ? __fget+0x237/0x370 [ 393.907936] ? security_file_ioctl+0x8f/0xc0 [ 393.912471] SyS_ioctl+0x8f/0xc0 [ 393.916043] ? do_vfs_ioctl+0x1070/0x1070 [ 393.920228] do_syscall_64+0x1eb/0x630 [ 393.924185] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 393.929232] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 393.934436] RIP: 0033:0x458da9 [ 393.937660] RSP: 002b:00007f23ff969c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 393.946587] RAX: ffffffffffffffda RBX: 00007f23ff969c90 RCX: 0000000000458da9 12:00:50 executing program 0 (fault-call:14 fault-nth:3): syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) [ 393.956031] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000005 [ 393.963489] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 393.970871] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ff96a6d4 [ 393.978876] R13: 00000000004c3215 R14: 00000000004d65a8 R15: 0000000000000006 12:00:50 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0xfffffffffffbfffb) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 12:00:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[]}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) [ 394.107017] FAULT_INJECTION: forcing a failure. [ 394.107017] name failslab, interval 1, probability 0, space 0, times 0 [ 394.145344] CPU: 1 PID: 19803 Comm: syz-executor.0 Not tainted 4.14.113 #3 12:00:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000540)={0xff, {{0xa, 0x4e20, 0x80000001, @mcast1, 0x4}}}, 0x88) fchmod(r0, 0x80) munlockall() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) ioctl$SIOCAX25GETUID(r3, 0x89e0, &(0x7f0000000400)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r4}) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x11f) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x5, 0xfe6, 0x1, 0x0, 0x3, 0x1a, 0x0, 0x5, 0xfffffffffffffff9, 0x1000, 0x5, 0x6, 0xfffffffffffffff9, 0x21fbe2ca, 0x56, 0x5b136a9f, 0x960, 0x6, 0x0, 0x78, 0x2, 0x8000, 0x1, 0x101, 0xd9ad, 0x101, 0x7fff, 0x8, 0x1, 0xffffffffffffff81, 0x3, 0x2, 0x8, 0x200, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x3, 0xffffffff}, 0x4, 0x300000000000, 0x652, 0x7, 0x80000000, 0x8, 0xcf0}, r5, 0x2, r1, 0x0) 12:00:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000140)={0xd, {0x0, 0x100, 0x0, 0x81}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f00000002c0)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) [ 394.153048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.153056] Call Trace: [ 394.153081] dump_stack+0x138/0x19c [ 394.153116] should_fail.cold+0x10f/0x159 [ 394.153137] should_failslab+0xdb/0x130 [ 394.153158] kmem_cache_alloc_node_trace+0x283/0x770 [ 394.153175] ? __hw_addr_add_ex+0x1c0/0x280 [ 394.153191] ? __lockdep_init_map+0x10c/0x570 [ 394.153205] __kmalloc_node+0x3d/0x80 [ 394.153220] kvmalloc_node+0x4e/0xe0 [ 394.153232] alloc_netdev_mqs+0x7ad/0xbc0 [ 394.153248] slip_open+0x2f1/0xfb5 [ 394.153264] ? tty_set_ldisc+0x22b/0x610 [ 394.212431] ? sl_uninit+0x20/0x20 [ 394.212445] ? sl_uninit+0x20/0x20 [ 394.212461] tty_ldisc_open.isra.0+0x75/0xc0 [ 394.212476] tty_set_ldisc+0x29a/0x610 [ 394.227919] tty_ioctl+0x976/0x1340 [ 394.231579] ? retint_kernel+0x2d/0x2d [ 394.235501] ? tty_vhangup+0x30/0x30 [ 394.235516] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 394.235535] ? check_preemption_disabled+0x3c/0x250 [ 394.235549] ? retint_kernel+0x2d/0x2d [ 394.235567] ? do_vfs_ioctl+0x83/0x1070 [ 394.249569] ? tty_vhangup+0x30/0x30 [ 394.249582] do_vfs_ioctl+0x7b9/0x1070 [ 394.249598] ? selinux_file_mprotect+0x5d0/0x5d0 [ 394.249616] ? check_preemption_disabled+0x3c/0x250 [ 394.249628] ? ioctl_preallocate+0x1c0/0x1c0 [ 394.283768] ? security_file_ioctl+0x8f/0xc0 [ 394.288393] SyS_ioctl+0x8f/0xc0 [ 394.291903] ? do_vfs_ioctl+0x1070/0x1070 [ 394.297103] do_syscall_64+0x1eb/0x630 [ 394.301149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 394.306217] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 394.314442] RIP: 0033:0x458da9 [ 394.317966] RSP: 002b:00007f23ff969c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 394.326704] RAX: ffffffffffffffda RBX: 00007f23ff969c90 RCX: 0000000000458da9 [ 394.335045] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000005 [ 394.343244] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 394.350823] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ff96a6d4 [ 394.358821] R13: 00000000004c3215 R14: 00000000004d65a8 R15: 0000000000000006 12:00:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad3"], 0x90) 12:00:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:50 executing program 0 (fault-call:14 fault-nth:4): syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() setsockopt$inet_tcp_int(r0, 0x6, 0xe, &(0x7f0000000080)=0x7fff, 0x4) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000540)={'raw\x00'}, &(0x7f00000002c0)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad39d9d841e06d69565f2f72ebc73da9c0c0091273f4eb5f9ade00c9652fe25b7d7f9f20342d1f46d7988602696a56f030030b5db29dce83e1e20eda3d1b2b5d254af5d240c6d649166c9daf9850d2cbeabc91761ba0eafde30ab923f544ce92c07c6d52ccb83c8c231c9a85176a94899b70345c99f6b592cc1bb6ae8db26de35e43085120c176eea3971712671988cd2"], 0x11f) [ 394.567386] FAULT_INJECTION: forcing a failure. [ 394.567386] name failslab, interval 1, probability 0, space 0, times 0 [ 394.585532] CPU: 0 PID: 19830 Comm: syz-executor.0 Not tainted 4.14.113 #3 [ 394.592857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.604171] Call Trace: [ 394.607249] dump_stack+0x138/0x19c [ 394.612004] should_fail.cold+0x10f/0x159 [ 394.616753] should_failslab+0xdb/0x130 [ 394.621030] kmem_cache_alloc_trace+0x2ec/0x790 [ 394.625910] ? lockdep_init_map+0x9/0x10 [ 394.630049] ? init_timer_key+0xdc/0x300 [ 394.634584] slip_open+0x815/0xfb5 [ 394.639194] ? tty_set_ldisc+0x22b/0x610 [ 394.644714] ? sl_uninit+0x20/0x20 [ 394.648280] ? sl_uninit+0x20/0x20 [ 394.651936] tty_ldisc_open.isra.0+0x75/0xc0 [ 394.657077] tty_set_ldisc+0x29a/0x610 [ 394.661982] tty_ioctl+0x976/0x1340 [ 394.661995] ? tty_vhangup+0x30/0x30 [ 394.662015] ? __might_sleep+0x93/0xb0 [ 394.662024] ? __fget+0x210/0x370 [ 394.662040] ? tty_vhangup+0x30/0x30 [ 394.662052] do_vfs_ioctl+0x7b9/0x1070 [ 394.662064] ? selinux_file_mprotect+0x5d0/0x5d0 [ 394.662076] ? lock_downgrade+0x6e0/0x6e0 [ 394.662086] ? ioctl_preallocate+0x1c0/0x1c0 [ 394.662118] ? __fget+0x237/0x370 [ 394.703854] ? security_file_ioctl+0x8f/0xc0 [ 394.708747] SyS_ioctl+0x8f/0xc0 [ 394.712339] ? do_vfs_ioctl+0x1070/0x1070 [ 394.717705] do_syscall_64+0x1eb/0x630 [ 394.722179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 394.729856] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 394.735077] RIP: 0033:0x458da9 [ 394.738646] RSP: 002b:00007f23ff969c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 394.747021] RAX: ffffffffffffffda RBX: 00007f23ff969c90 RCX: 0000000000458da9 [ 394.754490] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000005 12:00:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000d00)={0x2, &(0x7f0000000cc0)=[{0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}]}) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000440)=@x25={0x9, @remote={[], 0x2}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000540)="0e81cd8c3706ccf4477557f1f072c1186605aa55fb0424e04331de5f069116772f72d37ff7c593c764973751dcc03a72b99d8d475d8a404e22f8e8d0ce9d04577379a79ffeb0e2364a499aa9444faea9297835f23f3c01fa117c19d981e86e10946930f4", 0x64}], 0x1, &(0x7f0000000600)=[{0x110, 0x88, 0x81, "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"}, {0x98, 0x10f, 0x8001, "af99c5a00b96000663510680c70da960f95619667e54cb64a2c75bdeff4d05633ed60f5cfc7be40bc428bf83b4dea9d2a2677758b58d008787b2ecc5c3e4d5e460e39af49b3533d130cada58578965817422ea443d45270a6f7cb207a06f7a58f3be4b9078be9ef67f55b16ced7d59bb95f252f537403fc92348bfcbd8fced7c363c27891b0bf737"}, {0xe8, 0x10b, 0x7b61bfaa, "29a73471da8498f5fe6db5e7edf7bc1d27f875530aef19eb8bea8e7651219ffab8e3f12010ad555918a408ea1c1f01a48466f33f8c67b342c6268f11a7244d43f1da216a4c00d5334271fb4dc8eb7a44ea341347f72b434a0afb466387d2686c481d11335732c9ecd95b65548efb3b692185d48cf405b4379fdfb6646fd43759a9244864ed9254a3c0f57a2e965a71d9f7fc6b6252a9922949e7afa88e84b98674b1d64b0129b99431f883548bd587ed1ebef48eabccbe395b37a6f4c8f70972986439c8e40a767163d176295b8eb00c3856e2cc352964"}], 0x290}, 0x4000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00', r0}, 0x10) munlockall() accept4$ax25(r1, 0x0, &(0x7f0000000900), 0x80800) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x4807e, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x5) writev(r2, &(0x7f0000000400)=[{&(0x7f00000002c0)="eb6376a1426f00f996bcb591720a85a80f48a200"/29, 0x1d}, {&(0x7f0000000380)="06e779ceb6ddebd1c1c33c773376d73383616d01a4c0bb0ea11ba939e101581a30c0f4b62eb51e35dfc7858aa03070406831e545cea60c87558960b8a2a987e0dc8abc1ead3cd99b7bd3f1ad9859ee1bd0ff9965624fff6793", 0x59}], 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000140)=0x9) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000e80)=0xe8) syz_mount_image$f2fs(&(0x7f0000000d40)='f2fs\x00', &(0x7f0000000980)='./file0\x00', 0x6, 0x1, &(0x7f0000001100)=[{&(0x7f0000000fc0)="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", 0xfffffffffffffdab, 0x6}], 0x80000, &(0x7f0000001140)={[{@test_dummy_encryption='test_dummy_encryption'}], [{@appraise_type='appraise_type=imasig'}, {@subj_role={'subj_role'}}, {@obj_user={'obj_user', 0x3d, '}\"'}}, {@appraise='appraise'}, {@smackfsroot={'smackfsroot', 0x3d, '$zselinuxprocsecurityeth1selinuxlo:'}}]}) write$P9_RFSYNC(r0, &(0x7f0000000c80)={0x7, 0x33, 0x2}, 0x7) accept4$alg(r1, 0x0, 0x0, 0x800) r6 = semget(0x1, 0x0, 0x8) semctl$IPC_INFO(r6, 0x0, 0x3, &(0x7f00000009c0)=""/197) getsockopt$rose(r0, 0x104, 0x1, &(0x7f0000000c00), &(0x7f0000000c40)=0x4) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[], 0x0) 12:00:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[]}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$selinux_access(r0, &(0x7f0000000080)={'system_u:object_r:system_map_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x7f}, 0x46) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x200) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad96e24bbad3"], 0x90) [ 394.761897] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 394.769279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ff96a6d4 [ 394.776577] R13: 00000000004c3215 R14: 00000000004d65a8 R15: 0000000000000006 12:00:51 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x43c, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2, 'lblcr\x00', 0x0, 0x7f, 0x31}, 0x2c) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000002c0)) 12:00:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000080)={@local, @loopback, 0x0}, &(0x7f00000002c0)=0xc) bind(r1, &(0x7f0000000540)=@can={0x1d, r4}, 0x80) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad3"], 0x90) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000002c0)={r5, 0xa0, &(0x7f0000000540)=[@in6={0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xb7a8}, @in6={0xa, 0x4e23, 0x100, @loopback}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x20}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7, @empty, 0xc529}]}, &(0x7f0000000440)=0x10) 12:00:51 executing program 0 (fault-call:14 fault-nth:5): syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) [ 395.276316] FAULT_INJECTION: forcing a failure. [ 395.276316] name failslab, interval 1, probability 0, space 0, times 0 12:00:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) [ 395.366914] CPU: 0 PID: 19867 Comm: syz-executor.0 Not tainted 4.14.113 #3 [ 395.376921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.387084] Call Trace: [ 395.389725] dump_stack+0x138/0x19c [ 395.393502] should_fail.cold+0x10f/0x159 [ 395.398207] should_failslab+0xdb/0x130 [ 395.402305] kmem_cache_alloc_trace+0x2ec/0x790 [ 395.407287] ? lockdep_init_map+0x9/0x10 [ 395.411703] slip_open+0x85b/0xfb5 [ 395.415268] ? tty_set_ldisc+0x22b/0x610 [ 395.419364] ? sl_uninit+0x20/0x20 [ 395.422933] ? sl_uninit+0x20/0x20 [ 395.427074] tty_ldisc_open.isra.0+0x75/0xc0 [ 395.432119] tty_set_ldisc+0x29a/0x610 [ 395.436249] tty_ioctl+0x976/0x1340 [ 395.440823] ? tty_vhangup+0x30/0x30 [ 395.446239] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 395.451033] ? check_preemption_disabled+0x3c/0x250 [ 395.456344] ? retint_kernel+0x2d/0x2d [ 395.460265] ? tty_vhangup+0x30/0x30 [ 395.464027] ? tty_vhangup+0x30/0x30 [ 395.467868] do_vfs_ioctl+0x7b9/0x1070 [ 395.471904] ? selinux_file_mprotect+0x5d0/0x5d0 [ 395.476716] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 395.481533] ? ioctl_preallocate+0x1c0/0x1c0 [ 395.485981] ? check_preemption_disabled+0x3c/0x250 [ 395.491060] ? retint_kernel+0x2d/0x2d [ 395.495209] ? security_file_ioctl+0x8f/0xc0 [ 395.499650] SyS_ioctl+0x8f/0xc0 [ 395.503043] ? do_vfs_ioctl+0x1070/0x1070 [ 395.507225] do_syscall_64+0x1eb/0x630 [ 395.511179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 395.516269] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 395.521594] RIP: 0033:0x458da9 [ 395.524815] RSP: 002b:00007f23ff969c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 395.532638] RAX: ffffffffffffffda RBX: 00007f23ff969c90 RCX: 0000000000458da9 [ 395.539952] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000005 [ 395.547250] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 395.555702] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ff96a6d4 12:00:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x322) [ 395.564083] R13: 00000000004c3215 R14: 00000000004d65a8 R15: 0000000000000006 12:00:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f00000002c0)={0x8d4, 0x7f757f56, 0x2, @discrete={0x9, 0x5bf}}) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad3"], 0x90) 12:00:51 executing program 0 (fault-call:14 fault-nth:6): syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000140)="9de057d89153792e17cbd207b61af61a", 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 12:00:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) [ 395.817618] FAULT_INJECTION: forcing a failure. [ 395.817618] name failslab, interval 1, probability 0, space 0, times 0 [ 395.847004] CPU: 1 PID: 19885 Comm: syz-executor.0 Not tainted 4.14.113 #3 [ 395.855362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.865373] Call Trace: [ 395.868108] dump_stack+0x138/0x19c [ 395.872143] should_fail.cold+0x10f/0x159 [ 395.876362] should_failslab+0xdb/0x130 [ 395.880368] kmem_cache_alloc_trace+0x2ec/0x790 [ 395.885071] slip_open+0x89e/0xfb5 [ 395.888659] ? sl_uninit+0x20/0x20 [ 395.892357] ? sl_uninit+0x20/0x20 [ 395.896201] tty_ldisc_open.isra.0+0x75/0xc0 [ 395.900815] tty_set_ldisc+0x29a/0x610 [ 395.904895] tty_ioctl+0x976/0x1340 [ 395.908894] ? tty_vhangup+0x30/0x30 [ 395.912652] ? __might_sleep+0x93/0xb0 [ 395.916939] ? __fget+0x210/0x370 [ 395.920431] ? tty_vhangup+0x30/0x30 [ 395.924177] do_vfs_ioctl+0x7b9/0x1070 [ 395.928277] ? selinux_file_mprotect+0x5d0/0x5d0 [ 395.933060] ? lock_downgrade+0x6e0/0x6e0 [ 395.937701] ? ioctl_preallocate+0x1c0/0x1c0 [ 395.943576] ? __fget+0x237/0x370 [ 395.947150] ? security_file_ioctl+0x8f/0xc0 [ 395.952023] SyS_ioctl+0x8f/0xc0 [ 395.956204] ? do_vfs_ioctl+0x1070/0x1070 [ 395.961155] do_syscall_64+0x1eb/0x630 [ 395.967719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 395.973707] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 395.983503] RIP: 0033:0x458da9 [ 395.987123] RSP: 002b:00007f23ff969c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 395.999256] RAX: ffffffffffffffda RBX: 00007f23ff969c90 RCX: 0000000000458da9 12:00:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) timer_create(0x2, &(0x7f0000000380)={0x0, 0x12, 0x0, @thr={&(0x7f0000000140)="eb8dfc0cef0eb1a190efbb2f96ecb5f14949077d9093dbdbdb6f9b4e3cb3df9051a709a32e9a81a52c3333fd8671", &(0x7f00000002c0)="1997f1c41f99ead573597d"}}, &(0x7f00000003c0)=0x0) timer_delete(r1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) [ 396.008367] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000005 [ 396.019380] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 396.026869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ff96a6d4 [ 396.035208] R13: 00000000004c3215 R14: 00000000004d65a8 R15: 0000000000000006 12:00:52 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='gid_map\x00') exit(0x0) r0 = gettid() syz_open_procfs(r0, &(0x7f0000000140)='net/pty\x87e\x00') 12:00:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10f) 12:00:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008000) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'security\x00'}, &(0x7f0000000080)=0xffffffffffffff78) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) 12:00:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="9465be9353f5e6f1f62399cfb06f667bb6dfeee442b3bb35f7088f821c0f708aef35105ee015572a6fde430c6465bffba23a21ec662738e1635020ca2d9057e978cf26268448c8e837eece27a0ceab0c17075618d4fe55f27576dd0c346a6cd627f12cf803b879330f7350e96d87d27623d0271d331921bccdc6a615ad9612a0d927350fab2c2d87cf88e4e2e24bbad3"], 0x90) 12:00:52 executing program 0 (fault-call:14 fault-nth:7): syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 12:00:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) connect$l2tp(r0, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x4, 0x2, {0xa, 0x4e20, 0x7, @empty, 0x80}}}, 0x32) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, 0x0) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) sendmsg$can_raw(r0, &(0x7f0000000480)={&(0x7f00000003c0), 0x10, &(0x7f0000000440)={&(0x7f0000000400)=@can={{0x0, 0x41a, 0x3, 0x7fff}, 0x2, 0x3, 0x0, 0x0, "c81d68b4321f4d59"}, 0x10}, 0x1, 0x0, 0x0, 0x4004}, 0x4000) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$rose(r0, &(0x7f0000000140)=@full={0xb, @dev, @default, 0x0, [@default, @null, @rose, @null, @netrom]}, &(0x7f00000002c0)=0x40, 0x800) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000007c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000640), 0x4) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="715cd3041cce09cd11aba06260e96ba783f4a741d820804e1b7f17f35993af3dca5b5eedaad97185029b21bf1731bff86521e21107b05aa0788846dc86dd3ab8de53f5793dbdf267edee70f7c79b29fe2c4f877f1ea55458c5309555a55da44a6fddbd4082ace5ec5e9cc66bab4551732e386fda0b1e2632c9474f2392225e30953d56c93f0a1b355174dc0a2ac017989ffdb57e6ac436eb52c7eb3ae2d54fc6c4040e727c9f3597ecd8b389fd98622c4ffd5737208188d7618c6f6c9e0b3cc4903b09293c78fdebdfadbb449f26b49a"], 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000580)) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000540)=0x84f, 0x4) timer_create(0x3, &(0x7f00000005c0)={0x0, 0x3d, 0x7, @tid=0xffffffffffffffff}, &(0x7f0000000600)=0x0) timer_gettime(r3, &(0x7f0000000800)) [ 396.259129] FAULT_INJECTION: forcing a failure. [ 396.259129] name failslab, interval 1, probability 0, space 0, times 0 [ 396.281812] CPU: 1 PID: 19913 Comm: syz-executor.0 Not tainted 4.14.113 #3 [ 396.289724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.299186] Call Trace: [ 396.301853] dump_stack+0x138/0x19c [ 396.305635] should_fail.cold+0x10f/0x159 [ 396.309849] should_failslab+0xdb/0x130 [ 396.314061] kmem_cache_alloc_trace+0x2ec/0x790 [ 396.320167] ? slip_open+0x89e/0xfb5 [ 396.325184] ? rcu_read_lock_sched_held+0x110/0x130 [ 396.332744] ? kmem_cache_alloc_trace+0x626/0x790 [ 396.338108] slhc_init+0x89/0x4e7 [ 396.341612] slip_open+0x8c2/0xfb5 [ 396.345226] ? sl_uninit+0x20/0x20 [ 396.348972] ? sl_uninit+0x20/0x20 [ 396.352654] tty_ldisc_open.isra.0+0x75/0xc0 [ 396.359756] tty_set_ldisc+0x29a/0x610 [ 396.364041] tty_ioctl+0x976/0x1340 [ 396.367935] ? tty_vhangup+0x30/0x30 [ 396.371776] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 396.376609] ? __might_sleep+0x93/0xb0 [ 396.381552] ? __fget+0x210/0x370 [ 396.385421] ? tty_vhangup+0x30/0x30 [ 396.389252] do_vfs_ioctl+0x7b9/0x1070 [ 396.393272] ? selinux_file_mprotect+0x5d0/0x5d0 [ 396.398189] ? check_preemption_disabled+0x3c/0x250 [ 396.403324] ? ioctl_preallocate+0x1c0/0x1c0 [ 396.407783] ? selinux_file_mprotect+0x5d0/0x5d0 [ 396.413277] ? security_file_ioctl+0x8f/0xc0 [ 396.417814] SyS_ioctl+0x8f/0xc0 [ 396.421529] ? do_vfs_ioctl+0x1070/0x1070 [ 396.425797] do_syscall_64+0x1eb/0x630 [ 396.430332] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.435401] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 396.440941] RIP: 0033:0x458da9 [ 396.440947] RSP: 002b:00007f23ff969c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:00:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) munlockall() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x48080, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000540), 0x0, 0xfffffffffffffff8) r5 = request_key(&(0x7f0000000580)='big_key\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='/selinux/checkreqprot\x00', 0xfffffffffffffffe) keyctl$unlink(0x9, r4, r5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00'}, &(0x7f0000000100)=0x54) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x11f) [ 396.440958] RAX: ffffffffffffffda RBX: 00007f23ff969c90 RCX: 0000000000458da9 [ 396.440963] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000005 [ 396.440969] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 396.440975] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ff96a6d4 [ 396.440986] R13: 00000000004c3215 R14: 00000000004d65a8 R15: 0000000000000006 [ 396.463951] kobject: 'loop2' (ffff8880a495a0a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 396.482596] BUG: unable to handle kernel paging request at fffffffffffffff4 [ 396.509437] IP: slhc_free+0x31/0xb0 [ 396.513067] PGD 766d067 P4D 766d067 PUD 766f067 PMD 0 [ 396.518588] Oops: 0000 [#1] PREEMPT SMP KASAN [ 396.521395] kobject: 'loop5' (ffff8880a4aa1320): kobject_uevent_env [ 396.523199] Modules linked in: [ 396.523214] CPU: 1 PID: 19913 Comm: syz-executor.0 Not tainted 4.14.113 #3 [ 396.523220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.523233] task: ffff8880927f4400 task.stack: ffff88805ebe0000 [ 396.530498] kobject: 'loop5' (ffff8880a4aa1320): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 396.534678] RIP: 0010:slhc_free+0x31/0xb0 [ 396.534684] RSP: 0018:ffff88805ebe7ae8 EFLAGS: 00010246 [ 396.534692] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90007247000 [ 396.534698] RDX: 1ffffffffffffffe RSI: ffffffff83d4f8da RDI: fffffffffffffff4 [ 396.534708] RBP: ffff88805ebe7af8 R08: ffff8880927f4400 R09: ffff8880927f4cf0 [ 396.605985] R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4 [ 396.613630] R13: ffff888095e818c8 R14: ffff88808d1cd400 R15: ffff888095e80e00 [ 396.616297] kobject: 'loop2' (ffff8880a495a0a0): kobject_uevent_env [ 396.620916] FS: 00007f23ff96a700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 396.620923] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 396.620928] CR2: fffffffffffffff4 CR3: 0000000090d3d000 CR4: 00000000001406e0 [ 396.620936] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 396.620940] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 396.620944] Call Trace: [ 396.620963] slip_open+0xc96/0xfb5 [ 396.620975] ? sl_uninit+0x20/0x20 [ 396.649343] kobject: 'loop2' (ffff8880a495a0a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 396.652048] ? sl_uninit+0x20/0x20 [ 396.652062] tty_ldisc_open.isra.0+0x75/0xc0 [ 396.652073] tty_set_ldisc+0x29a/0x610 [ 396.652084] tty_ioctl+0x976/0x1340 [ 396.652116] ? tty_vhangup+0x30/0x30 [ 396.706030] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 396.710946] ? __might_sleep+0x93/0xb0 [ 396.715564] ? __fget+0x210/0x370 [ 396.719044] ? tty_vhangup+0x30/0x30 [ 396.722799] do_vfs_ioctl+0x7b9/0x1070 [ 396.726706] ? selinux_file_mprotect+0x5d0/0x5d0 [ 396.731747] ? check_preemption_disabled+0x3c/0x250 [ 396.736876] ? ioctl_preallocate+0x1c0/0x1c0 [ 396.741406] ? selinux_file_mprotect+0x5d0/0x5d0 [ 396.746188] ? security_file_ioctl+0x8f/0xc0 [ 396.750712] SyS_ioctl+0x8f/0xc0 [ 396.754108] ? do_vfs_ioctl+0x1070/0x1070 [ 396.758289] do_syscall_64+0x1eb/0x630 [ 396.762407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.767472] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 396.771425] kobject: 'loop5' (ffff8880a4aa1320): kobject_uevent_env [ 396.772764] RIP: 0033:0x458da9 [ 396.779201] kobject: 'loop5' (ffff8880a4aa1320): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 396.782385] RSP: 002b:00007f23ff969c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 396.782396] RAX: ffffffffffffffda RBX: 00007f23ff969c90 RCX: 0000000000458da9 [ 396.782400] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000005 [ 396.782405] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 396.782409] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ff96a6d4 [ 396.782414] R13: 00000000004c3215 R14: 00000000004d65a8 R15: 0000000000000006 [ 396.782424] Code: 41 54 49 89 fc e8 30 ee 87 fd 4d 85 e4 74 77 e8 26 ee 87 fd 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 6d <4d> 8b 2c 24 4d 85 ed 74 0d e8 01 ee 87 fd 4c 89 ef e8 69 69 b1 [ 396.860083] RIP: slhc_free+0x31/0xb0 RSP: ffff88805ebe7ae8 [ 396.865990] CR2: fffffffffffffff4 [ 396.869644] ---[ end trace 36c7d12a4f982190 ]--- [ 396.874414] Kernel panic - not syncing: Fatal exception [ 396.881255] Kernel Offset: disabled [ 396.885018] Rebooting in 86400 seconds..