Warning: Permanently added '10.128.0.149' (ECDSA) to the list of known hosts. 2021/07/16 22:23:50 fuzzer started 2021/07/16 22:23:50 dialing manager at 10.128.0.163:45775 2021/07/16 22:23:50 checking machine... 2021/07/16 22:23:50 checking revisions... 2021/07/16 22:23:50 testing simple program... [ 19.151595][ T25] audit: type=1400 audit(1626474230.841:8): avc: denied { execmem } for pid=1773 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 19.181716][ T1774] cgroup: Unknown subsys name 'perf_event' [ 19.188591][ T1774] cgroup: Unknown subsys name 'net_cls' 2021/07/16 22:23:52 building call list... [ 21.293951][ T25] audit: type=1400 audit(1626474232.981:9): avc: denied { create } for pid=1763 comm="syz-fuzzer" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 2021/07/16 22:24:01 syscalls: 1997 2021/07/16 22:24:01 code coverage: enabled 2021/07/16 22:24:01 comparison tracing: enabled 2021/07/16 22:24:01 extra coverage: enabled 2021/07/16 22:24:01 setuid sandbox: enabled 2021/07/16 22:24:01 namespace sandbox: enabled 2021/07/16 22:24:01 Android sandbox: enabled 2021/07/16 22:24:01 fault injection: enabled 2021/07/16 22:24:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/07/16 22:24:01 net packet injection: /dev/net/tun does not exist 2021/07/16 22:24:01 net device setup: enabled 2021/07/16 22:24:01 concurrency sanitizer: enabled 2021/07/16 22:24:01 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/07/16 22:24:01 USB emulation: /dev/raw-gadget does not exist 2021/07/16 22:24:01 hci packet injection: /dev/vhci does not exist 2021/07/16 22:24:01 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/07/16 22:24:01 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/07/16 22:24:01 fetching corpus: 0, signal 0/0 (executing program) 2021/07/16 22:24:01 fetching corpus: 0, signal 0/0 (executing program) 2021/07/16 22:24:02 starting 6 fuzzer processes 22:24:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b5d559b3c6e", 0x12e9}], 0x1) 22:24:02 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, 0x0) 22:24:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:02 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:02 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) [ 31.105997][ T2348] cgroup: Unknown subsys name 'perf_event' [ 31.121104][ T2348] cgroup: Unknown subsys name 'net_cls' [ 31.121548][ T2349] cgroup: Unknown subsys name 'perf_event' [ 31.128311][ T2350] cgroup: Unknown subsys name 'perf_event' [ 31.145870][ T2350] cgroup: Unknown subsys name 'net_cls' [ 31.145975][ T2349] cgroup: Unknown subsys name 'net_cls' [ 31.154236][ T2352] cgroup: Unknown subsys name 'perf_event' [ 31.163547][ T2354] cgroup: Unknown subsys name 'perf_event' [ 31.168691][ T2356] cgroup: Unknown subsys name 'perf_event' [ 31.169683][ T2354] cgroup: Unknown subsys name 'net_cls' [ 31.181731][ T2352] cgroup: Unknown subsys name 'net_cls' [ 31.184600][ T2356] cgroup: Unknown subsys name 'net_cls' 22:24:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:07 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:07 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, 0x0) [ 35.304553][ T5092] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.5'. 22:24:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b5d559b3c6e", 0x12e9}], 0x1) 22:24:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b5d559b3c6e", 0x12e9}], 0x1) 22:24:07 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, 0x0) 22:24:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b5d559b3c6e", 0x12e9}], 0x1) 22:24:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:07 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:07 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, 0x0) [ 35.593462][ T5142] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.5'. 22:24:09 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:09 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:10 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:10 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) [ 38.309168][ T5168] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.0'. 22:24:10 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) [ 38.443360][ T5179] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.5'. 22:24:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 38.657110][ T5196] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.5'. 22:24:10 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) [ 38.732048][ T5201] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.0'. 22:24:10 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:10 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:12 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be4e677d114b655ef5f0166391c48f72cc4e260f82e8a9bfc92bfda0b4de0f03a267e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a22e3fc56d2b0cae5170871c145045174ad6efcffffffffffffff2d6f3faefffc6b665334a5248ac62fb53ed65494b53e33652e1eb2d4290e2cd4da29e56b742feca6968bf22f1bfcd572d14a16a584b2c247cda082ad5314c265eece01d9978ae76cf3273edeae7c4319a5755df6da9cee1e57629f2bed93e09cb295b383fc04f12f77df84a0278adba0a2e43d1aa09b2e3bddcf3145138a31d68135e0143c801e2f83c23d00006d4f7977eb5fc97f1509f4f750d42a042dd31cea44b97b4572d60826a148d584d1b6081c0df765db9c5470584891ff6bc8a53b8480a9424b33ad2f4cd32e3515b178b1cbcf0101e533db8a2f6fad8cf7238ada150cfb0865c595734dfe0f418a73cc9ad2682c11cc691b14085c8ab50282d0a6a1ca21822b637c67b16dd7172093f779686e8de6492d7e350ed54fdf510d63f8194e9f3687b2ce970d857207abddd809c482a3997c8bac48725e346905000000b1eeadda62debb8db98972", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:12 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) [ 41.325949][ T5243] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.0'. 22:24:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:13 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:13 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:13 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:13 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:13 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:13 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:13 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:13 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:15 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:15 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:15 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:15 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:15 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 44.380903][ T5328] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.2'. 22:24:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 44.675783][ T5348] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.2'. 22:24:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:16 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:16 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) 22:24:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:16 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bind(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000000)='./bus\x00', 0x0, 0x2005040, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8) [ 44.899258][ T5353] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.4'. 22:24:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 45.078647][ T5365] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.1'. [ 45.095072][ T5367] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.2'. [ 45.130647][ T5371] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.5'. 22:24:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 45.343214][ T5390] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.4'. [ 45.414805][ T5396] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.2'. [ 45.482091][ T5402] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.5'. 22:24:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b5d559b3c6e", 0x12e9}], 0x1) 22:24:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b5d559b3c6e", 0x12e9}], 0x1) 22:24:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b5d559b3c6e", 0x12e9}], 0x1) 22:24:17 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, 0x0) 22:24:17 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, 0x0) 22:24:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b5d559b3c6e", 0x12e9}], 0x1) 22:24:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:17 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, 0x0) 22:24:17 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be4e677d114b655ef5f0166391c48f72cc4e260f82e8a9bfc92bfda0b4de0f03a267e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a22e3fc56d2b0cae5170871c145045174ad6efcffffffffffffff2d6f3faefffc6b665334a5248ac62fb53ed65494b53e33652e1eb2d4290e2cd4da29e56b742feca6968bf22f1bfcd572d14a16a584b2c247cda082ad5314c265eece01d9978ae76cf3273edeae7c4319a5755df6da9cee1e57629f2bed93e09cb295b383fc04f12f77df84a0278adba0a2e43d1aa09b2e3bddcf3145138a31d68135e0143c801e2f83c23d00006d4f7977eb5fc97f1509f4f750d42a042dd31cea44b97b4572d60826a148d584d1b6081c0df765db9c5470584891ff6bc8a53b8480a9424b33ad2f4cd32e3515b178b1cbcf0101e533db8a2f6fad8cf7238ada150cfb0865c595734dfe0f418a73cc9ad2682c11cc691b14085c8ab50282d0a6a1ca21822b637c67b16dd7172093f779686e8de6492d7e350ed54fdf510d63f8194e9f3687b2ce970d857207abddd809c482a3997c8bac48725e346905000000b1eeadda62debb8db98972", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b5d559b3c6e", 0x12e9}], 0x1) 22:24:17 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be4e677d114b655ef5f0166391c48f72cc4e260f82e8a9bfc92bfda0b4de0f03a267e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a22e3fc56d2b0cae5170871c145045174ad6efcffffffffffffff2d6f3faefffc6b665334a5248ac62fb53ed65494b53e33652e1eb2d4290e2cd4da29e56b742feca6968bf22f1bfcd572d14a16a584b2c247cda082ad5314c265eece01d9978ae76cf3273edeae7c4319a5755df6da9cee1e57629f2bed93e09cb295b383fc04f12f77df84a0278adba0a2e43d1aa09b2e3bddcf3145138a31d68135e0143c801e2f83c23d00006d4f7977eb5fc97f1509f4f750d42a042dd31cea44b97b4572d60826a148d584d1b6081c0df765db9c5470584891ff6bc8a53b8480a9424b33ad2f4cd32e3515b178b1cbcf0101e533db8a2f6fad8cf7238ada150cfb0865c595734dfe0f418a73cc9ad2682c11cc691b14085c8ab50282d0a6a1ca21822b637c67b16dd7172093f779686e8de6492d7e350ed54fdf510d63f8194e9f3687b2ce970d857207abddd809c482a3997c8bac48725e346905000000b1eeadda62debb8db98972", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:17 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:17 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b5d559b3c6e", 0x12e9}], 0x1) 22:24:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01000019000100000000000000000002"], 0x11c}], 0x1}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:24:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) [ 46.500905][ T5511] __nla_validate_parse: 8 callbacks suppressed [ 46.500915][ T5511] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.3'. 22:24:20 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be4e677d114b655ef5f0166391c48f72cc4e260f82e8a9bfc92bfda0b4de0f03a267e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a22e3fc56d2b0cae5170871c145045174ad6efcffffffffffffff2d6f3faefffc6b665334a5248ac62fb53ed65494b53e33652e1eb2d4290e2cd4da29e56b742feca6968bf22f1bfcd572d14a16a584b2c247cda082ad5314c265eece01d9978ae76cf3273edeae7c4319a5755df6da9cee1e57629f2bed93e09cb295b383fc04f12f77df84a0278adba0a2e43d1aa09b2e3bddcf3145138a31d68135e0143c801e2f83c23d00006d4f7977eb5fc97f1509f4f750d42a042dd31cea44b97b4572d60826a148d584d1b6081c0df765db9c5470584891ff6bc8a53b8480a9424b33ad2f4cd32e3515b178b1cbcf0101e533db8a2f6fad8cf7238ada150cfb0865c595734dfe0f418a73cc9ad2682c11cc691b14085c8ab50282d0a6a1ca21822b637c67b16dd7172093f779686e8de6492d7e350ed54fdf510d63f8194e9f3687b2ce970d857207abddd809c482a3997c8bac48725e346905000000b1eeadda62debb8db98972", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:20 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be4e677d114b655ef5f0166391c48f72cc4e260f82e8a9bfc92bfda0b4de0f03a267e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a22e3fc56d2b0cae5170871c145045174ad6efcffffffffffffff2d6f3faefffc6b665334a5248ac62fb53ed65494b53e33652e1eb2d4290e2cd4da29e56b742feca6968bf22f1bfcd572d14a16a584b2c247cda082ad5314c265eece01d9978ae76cf3273edeae7c4319a5755df6da9cee1e57629f2bed93e09cb295b383fc04f12f77df84a0278adba0a2e43d1aa09b2e3bddcf3145138a31d68135e0143c801e2f83c23d00006d4f7977eb5fc97f1509f4f750d42a042dd31cea44b97b4572d60826a148d584d1b6081c0df765db9c5470584891ff6bc8a53b8480a9424b33ad2f4cd32e3515b178b1cbcf0101e533db8a2f6fad8cf7238ada150cfb0865c595734dfe0f418a73cc9ad2682c11cc691b14085c8ab50282d0a6a1ca21822b637c67b16dd7172093f779686e8de6492d7e350ed54fdf510d63f8194e9f3687b2ce970d857207abddd809c482a3997c8bac48725e346905000000b1eeadda62debb8db98972", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:20 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be4e677d114b655ef5f0166391c48f72cc4e260f82e8a9bfc92bfda0b4de0f03a267e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a22e3fc56d2b0cae5170871c145045174ad6efcffffffffffffff2d6f3faefffc6b665334a5248ac62fb53ed65494b53e33652e1eb2d4290e2cd4da29e56b742feca6968bf22f1bfcd572d14a16a584b2c247cda082ad5314c265eece01d9978ae76cf3273edeae7c4319a5755df6da9cee1e57629f2bed93e09cb295b383fc04f12f77df84a0278adba0a2e43d1aa09b2e3bddcf3145138a31d68135e0143c801e2f83c23d00006d4f7977eb5fc97f1509f4f750d42a042dd31cea44b97b4572d60826a148d584d1b6081c0df765db9c5470584891ff6bc8a53b8480a9424b33ad2f4cd32e3515b178b1cbcf0101e533db8a2f6fad8cf7238ada150cfb0865c595734dfe0f418a73cc9ad2682c11cc691b14085c8ab50282d0a6a1ca21822b637c67b16dd7172093f779686e8de6492d7e350ed54fdf510d63f8194e9f3687b2ce970d857207abddd809c482a3997c8bac48725e346905000000b1eeadda62debb8db98972", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:20 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x11) 22:24:23 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:23 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be4e677d114b655ef5f0166391c48f72cc4e260f82e8a9bfc92bfda0b4de0f03a267e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a22e3fc56d2b0cae5170871c145045174ad6efcffffffffffffff2d6f3faefffc6b665334a5248ac62fb53ed65494b53e33652e1eb2d4290e2cd4da29e56b742feca6968bf22f1bfcd572d14a16a584b2c247cda082ad5314c265eece01d9978ae76cf3273edeae7c4319a5755df6da9cee1e57629f2bed93e09cb295b383fc04f12f77df84a0278adba0a2e43d1aa09b2e3bddcf3145138a31d68135e0143c801e2f83c23d00006d4f7977eb5fc97f1509f4f750d42a042dd31cea44b97b4572d60826a148d584d1b6081c0df765db9c5470584891ff6bc8a53b8480a9424b33ad2f4cd32e3515b178b1cbcf0101e533db8a2f6fad8cf7238ada150cfb0865c595734dfe0f418a73cc9ad2682c11cc691b14085c8ab50282d0a6a1ca21822b637c67b16dd7172093f779686e8de6492d7e350ed54fdf510d63f8194e9f3687b2ce970d857207abddd809c482a3997c8bac48725e346905000000b1eeadda62debb8db98972", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:23 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be4e677d114b655ef5f0166391c48f72cc4e260f82e8a9bfc92bfda0b4de0f03a267e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a22e3fc56d2b0cae5170871c145045174ad6efcffffffffffffff2d6f3faefffc6b665334a5248ac62fb53ed65494b53e33652e1eb2d4290e2cd4da29e56b742feca6968bf22f1bfcd572d14a16a584b2c247cda082ad5314c265eece01d9978ae76cf3273edeae7c4319a5755df6da9cee1e57629f2bed93e09cb295b383fc04f12f77df84a0278adba0a2e43d1aa09b2e3bddcf3145138a31d68135e0143c801e2f83c23d00006d4f7977eb5fc97f1509f4f750d42a042dd31cea44b97b4572d60826a148d584d1b6081c0df765db9c5470584891ff6bc8a53b8480a9424b33ad2f4cd32e3515b178b1cbcf0101e533db8a2f6fad8cf7238ada150cfb0865c595734dfe0f418a73cc9ad2682c11cc691b14085c8ab50282d0a6a1ca21822b637c67b16dd7172093f779686e8de6492d7e350ed54fdf510d63f8194e9f3687b2ce970d857207abddd809c482a3997c8bac48725e346905000000b1eeadda62debb8db98972", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x11) 22:24:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x11) 22:24:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 22:24:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x11) 22:24:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:26 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') 22:24:27 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 55.411711][ T5684] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure 22:24:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:27 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') 22:24:27 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') 22:24:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x34) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 22:24:27 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:27 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:27 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') 22:24:27 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') 22:24:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:27 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:27 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') 22:24:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:27 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') 22:24:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:27 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:27 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') [ 55.907729][ C1] hrtimer: interrupt took 18290 ns 22:24:28 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:28 executing program 5: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:28 executing program 0: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:28 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:28 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:28 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:28 executing program 0: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:29 executing program 5: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:29 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:29 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:29 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:29 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:29 executing program 0: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:29 executing program 5: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:30 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:30 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:30 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:30 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:30 executing program 5: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:30 executing program 0: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:31 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:31 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:31 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:31 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:31 executing program 0: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:31 executing program 5: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:31 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:32 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:32 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:32 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:32 executing program 5: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:32 executing program 0: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:32 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:32 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:32 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:33 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:33 executing program 0: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:33 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:33 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:33 executing program 1: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:33 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:33 executing program 0: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:33 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:33 executing program 1: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x45, &(0x7f0000000080), 0x4) 22:24:33 executing program 1: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:33 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 1: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:34 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 0: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:34 executing program 1: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="b1687884d0b58645cc361cb39daa3aaf7245b9cdee785bcabd8a9d10d8f4f36aaa82758081cd3d2ca27e834cabd40bef1933ea395e6193b8942b90ecadfeb4a325f8b41ba5d67725ca20f05ef264871a2b5c3bb85b7156e12071c4b6d5966c763246ab60228d28655a1ee304bde3647caee001845aad2138ad8ed175754a8f4fba5cabddbaa2ed4b9f107ca543bafeb669d51efdadafed3397a946297f9d7d397b4357dc444bbda5c0adfba256289f07f4541586e4c786510fedff64d002ffa617a3dd10e46fa77adb6d96a02af5cba054da5c75420ec7064378458cefd5ad0960b69abbfd836e", @ANYRES64, @ANYBLOB="020004e2e8ed02c9cb4c40922182051cb643b2bcf9926af26696f10d40e4eb66bb9fdaa8573c83d23c25b53d267e7f03f35e20afed9563d6a10c7cba2ecd8c9f442e38d8", @ANYRES32=0x0, @ANYRES16, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="020002", @ANYRESHEX, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004b0b83a4910d3acf552585fa0e500000000007f0001", @ANYRES32=r0, @ANYBLOB="10000500000000002000"], 0x74, 0x6) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026, r1}, &(0x7f00000001c0)={0x1000, 0xfffff800, 0x0, 0xc9, 0x7, 0x57c1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000080)=0x2fb, 0x4) socket$packet(0x11, 0x3, 0x300) sendmmsg(r5, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r5, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000034c0)='gid_map\x00') 22:24:34 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 1: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 1: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 1: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 2: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 3: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 1: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="66530700ae890400000026b073639a1e954d5ab555b1dd249c54f2b004e1dcdd1fdf67e4d32711921cc5e41e4a2133d19ac53aa206b9eb4c29c07a5f919112bb21ed844ff13ba15ea8fc5f7a856aa041016365995db08e416a489d", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:34 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002fc0)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc) 22:24:34 executing program 2: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:34 executing program 3: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 2: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:34 executing program 5: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:34 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="66530700ae890400000026b073639a1e954d5ab555b1dd249c54f2b004e1dcdd1fdf67e4d32711921cc5e41e4a2133d19ac53aa206b9eb4c29c07a5f919112bb21ed844ff13ba15ea8fc5f7a856aa041016365995db08e416a489d", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002fc0)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc) 22:24:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002fc0)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc) 22:24:35 executing program 5: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:35 executing program 3: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f02", 0x8) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:24:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002fc0)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc) 22:24:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002fc0)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc) 22:24:35 executing program 3: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:35 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:35 executing program 5: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002fc0)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc) 22:24:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002fc0)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc) 22:24:37 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="66530700ae890400000026b073639a1e954d5ab555b1dd249c54f2b004e1dcdd1fdf67e4d32711921cc5e41e4a2133d19ac53aa206b9eb4c29c07a5f919112bb21ed844ff13ba15ea8fc5f7a856aa041016365995db08e416a489d", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:37 executing program 3: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:37 executing program 5: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:37 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:37 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:37 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:38 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:38 executing program 3: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:38 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:38 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:38 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:38 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:41 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="66530700ae890400000026b073639a1e954d5ab555b1dd249c54f2b004e1dcdd1fdf67e4d32711921cc5e41e4a2133d19ac53aa206b9eb4c29c07a5f919112bb21ed844ff13ba15ea8fc5f7a856aa041016365995db08e416a489d", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:41 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:41 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:41 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:41 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:41 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) [ 69.420746][ T6521] ================================================================== [ 69.428858][ T6521] BUG: KCSAN: data-race in filemap_fault / generic_write_end [ 69.436230][ T6521] [ 69.438546][ T6521] write to 0xffff888106abe700 of 8 bytes by task 6514 on cpu 1: [ 69.446187][ T6521] generic_write_end+0x96/0x180 [ 69.451037][ T6521] ext4_da_write_end+0x59b/0x730 [ 69.455978][ T6521] generic_perform_write+0x22a/0x3c0 [ 69.461267][ T6521] ext4_buffered_write_iter+0x2f2/0x3f0 [ 69.466815][ T6521] ext4_file_write_iter+0x2e7/0x11d0 [ 69.472088][ T6521] do_iter_readv_writev+0x2cb/0x360 [ 69.477288][ T6521] do_iter_write+0x112/0x4c0 [ 69.481863][ T6521] vfs_iter_write+0x4c/0x70 [ 69.486357][ T6521] iter_file_splice_write+0x40a/0x750 [ 69.491723][ T6521] direct_splice_actor+0x80/0xa0 [ 69.496656][ T6521] splice_direct_to_actor+0x345/0x650 [ 69.502028][ T6521] do_splice_direct+0xf5/0x170 [ 69.506791][ T6521] do_sendfile+0x773/0xda0 [ 69.511205][ T6521] __x64_sys_sendfile64+0xf2/0x130 [ 69.516310][ T6521] do_syscall_64+0x3d/0x90 [ 69.520730][ T6521] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 69.526702][ T6521] [ 69.529012][ T6521] read to 0xffff888106abe700 of 8 bytes by task 6521 on cpu 0: [ 69.536535][ T6521] filemap_fault+0x8a/0x7b0 [ 69.541037][ T6521] ext4_filemap_fault+0x4b/0x60 [ 69.545885][ T6521] handle_mm_fault+0xf56/0x1a50 [ 69.550724][ T6521] do_user_addr_fault+0x609/0xbe0 [ 69.555740][ T6521] exc_page_fault+0x91/0x220 [ 69.560321][ T6521] asm_exc_page_fault+0x1e/0x30 [ 69.565156][ T6521] copy_user_enhanced_fast_string+0xe/0x40 [ 69.570950][ T6521] copy_page_to_iter+0x2ef/0x940 [ 69.575885][ T6521] filemap_read+0xef6/0x1220 [ 69.580478][ T6521] generic_file_read_iter+0x75/0x2c0 [ 69.585752][ T6521] ext4_file_read_iter+0x1db/0x290 [ 69.590865][ T6521] vfs_read+0x565/0x5d0 [ 69.595015][ T6521] ksys_read+0xce/0x180 [ 69.599162][ T6521] __x64_sys_read+0x3e/0x50 [ 69.603658][ T6521] do_syscall_64+0x3d/0x90 [ 69.608071][ T6521] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 69.613967][ T6521] [ 69.616281][ T6521] value changed: 0x0000000000147000 -> 0x0000000000148000 [ 69.623367][ T6521] [ 69.625677][ T6521] Reported by Kernel Concurrency Sanitizer on: [ 69.631807][ T6521] CPU: 0 PID: 6521 Comm: syz-executor.3 Not tainted 5.14.0-rc1-syzkaller #0 [ 69.640467][ T6521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.651847][ T6521] ================================================================== 22:24:41 executing program 2: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:41 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:42 executing program 4: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:42 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:42 executing program 2: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:42 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) [ 70.468397][ T6545] ================================================================== [ 70.476520][ T6545] BUG: KCSAN: data-race in filemap_fault / generic_write_end [ 70.483984][ T6545] [ 70.486313][ T6545] write to 0xffff888106a54210 of 8 bytes by task 6541 on cpu 1: [ 70.493936][ T6545] generic_write_end+0x96/0x180 [ 70.498789][ T6545] ext4_da_write_end+0x59b/0x730 [ 70.503724][ T6545] generic_perform_write+0x22a/0x3c0 [ 70.509004][ T6545] ext4_buffered_write_iter+0x2f2/0x3f0 [ 70.514554][ T6545] ext4_file_write_iter+0x2e7/0x11d0 [ 70.519832][ T6545] do_iter_readv_writev+0x2cb/0x360 [ 70.525020][ T6545] do_iter_write+0x112/0x4c0 [ 70.529598][ T6545] vfs_iter_write+0x4c/0x70 [ 70.534089][ T6545] iter_file_splice_write+0x40a/0x750 [ 70.539461][ T6545] direct_splice_actor+0x80/0xa0 [ 70.544388][ T6545] splice_direct_to_actor+0x345/0x650 [ 70.549756][ T6545] do_splice_direct+0xf5/0x170 [ 70.554521][ T6545] do_sendfile+0x773/0xda0 [ 70.559021][ T6545] __x64_sys_sendfile64+0xf2/0x130 [ 70.564126][ T6545] do_syscall_64+0x3d/0x90 [ 70.568553][ T6545] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.574469][ T6545] [ 70.576775][ T6545] read to 0xffff888106a54210 of 8 bytes by task 6545 on cpu 0: [ 70.584319][ T6545] filemap_fault+0x504/0x7b0 [ 70.588904][ T6545] ext4_filemap_fault+0x4b/0x60 [ 70.593765][ T6545] handle_mm_fault+0xf56/0x1a50 [ 70.598603][ T6545] do_user_addr_fault+0x609/0xbe0 [ 70.603624][ T6545] exc_page_fault+0x91/0x220 [ 70.608208][ T6545] asm_exc_page_fault+0x1e/0x30 [ 70.613049][ T6545] copy_user_enhanced_fast_string+0xe/0x40 [ 70.618840][ T6545] copy_page_to_iter+0x2ef/0x940 [ 70.623770][ T6545] filemap_read+0xef6/0x1220 [ 70.628356][ T6545] generic_file_read_iter+0x75/0x2c0 [ 70.633639][ T6545] ext4_file_read_iter+0x1db/0x290 [ 70.638739][ T6545] vfs_read+0x565/0x5d0 [ 70.642887][ T6545] ksys_read+0xce/0x180 [ 70.647025][ T6545] __x64_sys_read+0x3e/0x50 [ 70.651519][ T6545] do_syscall_64+0x3d/0x90 [ 70.655931][ T6545] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.661826][ T6545] [ 70.664137][ T6545] value changed: 0x00000000002fc600 -> 0x00000000002fd800 [ 70.671224][ T6545] [ 70.673536][ T6545] Reported by Kernel Concurrency Sanitizer on: [ 70.679665][ T6545] CPU: 0 PID: 6545 Comm: syz-executor.3 Not tainted 5.14.0-rc1-syzkaller #0 [ 70.688336][ T6545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.698385][ T6545] ================================================================== 22:24:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000001380)={0x1c, 0x1e, 0x21214b84c37e3ba3, 0x0, 0x0, "", [@nested={0xa, 0x0, 0x0, 0x1, [@generic="b284acdd66b9"]}]}, 0x1c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 22:24:44 executing program 2: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:44 executing program 4: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:44 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="66530700ae890400000026b073639a1e954d5ab555b1dd249c54f2b004e1dcdd1fdf67e4d32711921cc5e41e4a2133d19ac53aa206b9eb4c29c07a5f919112bb21ed844ff13ba15ea8fc5f7a856aa041016365995db08e416a489d", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:44 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 22:24:44 executing program 0: r0 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000040)=""/69) 22:24:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000001380)={0x1c, 0x1e, 0x21214b84c37e3ba3, 0x0, 0x0, "", [@nested={0xa, 0x0, 0x0, 0x1, [@generic="b284acdd66b9"]}]}, 0x1c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 22:24:44 executing program 4: unshare(0x40400) r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 22:24:44 executing program 0: r0 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000040)=""/69) 22:24:44 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000040)=""/69) 22:24:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000001380)={0x1c, 0x1e, 0x21214b84c37e3ba3, 0x0, 0x0, "", [@nested={0xa, 0x0, 0x0, 0x1, [@generic="b284acdd66b9"]}]}, 0x1c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 22:24:44 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000040)=""/69) 22:24:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000001380)={0x1c, 0x1e, 0x21214b84c37e3ba3, 0x0, 0x0, "", [@nested={0xa, 0x0, 0x0, 0x1, [@generic="b284acdd66b9"]}]}, 0x1c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 22:24:44 executing program 0: r0 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000040)=""/69) 22:24:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000001380)={0x1c, 0x1e, 0x21214b84c37e3ba3, 0x0, 0x0, "", [@nested={0xa, 0x0, 0x0, 0x1, [@generic="b284acdd66b9"]}]}, 0x1c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 22:24:47 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="66530700ae890400000026b073639a1e954d5ab555b1dd249c54f2b004e1dcdd1fdf67e4d32711921cc5e41e4a2133d19ac53aa206b9eb4c29c07a5f919112bb21ed844ff13ba15ea8fc5f7a856aa041016365995db08e416a489d", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:47 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000040)=""/69) 22:24:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000001380)={0x1c, 0x1e, 0x21214b84c37e3ba3, 0x0, 0x0, "", [@nested={0xa, 0x0, 0x0, 0x1, [@generic="b284acdd66b9"]}]}, 0x1c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 22:24:47 executing program 0: r0 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000040)=""/69) 22:24:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2010050, 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0xbc9dc8fbd81cb4a1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) unshare(0x40600) fcntl$setstatus(r0, 0x4, 0xc00) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000400)='P', 0x1}], 0x1) 22:24:47 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 22:24:47 executing program 0: set_robust_list(0x0, 0x0) 22:24:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2010050, 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0xbc9dc8fbd81cb4a1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) unshare(0x40600) fcntl$setstatus(r0, 0x4, 0xc00) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000400)='P', 0x1}], 0x1) 22:24:47 executing program 0: set_robust_list(0x0, 0x0) [ 75.390420][ T25] audit: type=1400 audit(1626474287.087:10): avc: denied { block_suspend } for pid=6599 comm="syz-executor.1" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 22:24:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000001380)={0x1c, 0x1e, 0x21214b84c37e3ba3, 0x0, 0x0, "", [@nested={0xa, 0x0, 0x0, 0x1, [@generic="b284acdd66b9"]}]}, 0x1c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 22:24:47 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 22:24:47 executing program 0: set_robust_list(0x0, 0x0) 22:24:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2010050, 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0xbc9dc8fbd81cb4a1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) unshare(0x40600) fcntl$setstatus(r0, 0x4, 0xc00) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000400)='P', 0x1}], 0x1) 22:24:50 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 22:24:50 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 22:24:50 executing program 0: set_robust_list(0x0, 0x0) 22:24:50 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 22:24:50 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="66530700ae890400000026b073639a1e954d5ab555b1dd249c54f2b004e1dcdd1fdf67e4d32711921cc5e41e4a2133d19ac53aa206b9eb4c29c07a5f919112bb21ed844ff13ba15ea8fc5f7a856aa041016365995db08e416a489d", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:24:50 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 22:24:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2010050, 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0xbc9dc8fbd81cb4a1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) unshare(0x40600) fcntl$setstatus(r0, 0x4, 0xc00) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000400)='P', 0x1}], 0x1) 22:24:50 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 22:24:50 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 22:24:50 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 22:24:50 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 22:24:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2010050, 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0xbc9dc8fbd81cb4a1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) unshare(0x40600) fcntl$setstatus(r0, 0x4, 0xc00) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000400)='P', 0x1}], 0x1) 22:24:50 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 22:24:50 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 22:24:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2010050, 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0xbc9dc8fbd81cb4a1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) unshare(0x40600) fcntl$setstatus(r0, 0x4, 0xc00) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000400)='P', 0x1}], 0x1) 22:24:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2010050, 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0xbc9dc8fbd81cb4a1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) unshare(0x40600) fcntl$setstatus(r0, 0x4, 0xc00) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000400)='P', 0x1}], 0x1)