0x3fdd}, 0x48) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f0000000880)=ANY=[@ANYBLOB="6c0000df258119be1913c2faf956faf68c8a2a22000a0000003409fa8649a6d6615257188795d3ad11a3f10bb5f8cd4dfb5823a7cb152f8e455b57200e6ddb47912583a9003cb2c9deffb18fa2d1bb5fec1df44d6acdb2bea4eabb71e301958aba6ed7ab4a532c6f8c25e48a6c4518766f602b032659d480b1686dff899f92453ec6c097910007844fba82717b7abd2a3a0632c8b6d343dc68948c462f4893e08fd308658873bfbe1f417b4fbc4bf067b5e2c201a76eb9865f17951f511498c722719fb18966d83e17f5a445bf62f479dbc78abe1eee9f9ae79412390957845e97e337261a3574bd8f832eab9997f15d9badb5cdd8a3f1d2ce7f5f3e135181fcaa38e1c985416457594764aa40033d92de36828b49a13df68dd2cec893f607c1a0c2815bbba23c5f881a791d291fc5bd957209bf1f64e439ee56c9148e548c3282ec02645ff2d09e97ccfb3139dad43b75b72fc2061c745f501cd950ff2dca239d0a8f28a0c92bcc729076424d097a0e358d842a2e53c17684401e72a498585cd1e43524d60bd293d881aba25648b93ec22b4171fa8a0f07df8795f7ec23baedac2e65183da0152aa8984b33862691621e5f9f28332dfb457dc0e57c41bd667cc388233136f93e7c45ca552e102c71196385c8c2d3719c0aa33b62eae040f854329fa306ce53aeebb2868b21c33f55cfcacce79cf9b2f4f522253d23a0656237019721cad052a324b903318b32e36035a228f14311c63ba77d334e62f43401de750d794b9f0ae731bd0258c3c13679c9a1f62948b69646d8c33e2bc7f7db3aa3eab3ac10722b41aea4d7648aed3d36d932bbe88a0500000013126392e917", @ANYRES32=0x0, @ANYBLOB="0400900a08000700fe01000008000a00ff010000060006004e240000140003000101000006000000010001001000000008000400618a00000a000200bbbbbbbbbbbb0000080001000a01010108000a0000000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r5, 0x401870c8, &(0x7f0000000040)={0xf18}) write$binfmt_script(r5, &(0x7f00000023c0)={'#! ', './file0', [{0x20, '0\xd3'}, {0x20, 'h\xee\xac\x1a\xa3\xf6\xea\xf9\xec\xac\xce?Bw\xd1E\t\xf1L\xb5\xfd\xf7\x10\x96\xcd3\xd2\xd6wl\xf8\xb7\x81\xce?\xc28\xc1;>\x84\xac;\x8c\x11\xd4\x10+S\x9b\xee\x1c]u\x88\xaa\x04d\xa1\xc3\xdc\x88/28\xa2#\xd7|,6C\xec\x93\x83{V\xaf\x96\xbb\x9f\xa5\x05\xe2mT\x00\xa29\xab\x8c\x80\xae\x91\xcb\a[dt\x1c`\xe3\xb2\xc7\x9f5\x03\xee\xb2\xdfU;\xac2\x1f\x95\xddR\xbeR\xe4C\x95\x8d#\x11\xac\xd8\xc6\xf2\x85\xcc\x16\x18\xdf\v\xe0\xadH\x8fC0\xc2\x18\x1a\x03)Q\xb5\xa66\xd6\xb3\xfc\x90\xd2\xa2\xa1\xfa\xe6\xe0J\xef\x82\x9b\x00\x1c\xe1\x16g\xc4\xc2\xc0\t\x18x\xea\xf7\xb7\x9b\xf1\xfb\xc4\x9d\xf2\x18\x81\x0f\xf5T\x8e&0\xad\xe0L\xee7 o\xc09\xca\xd7\xc2\x02\xb2\r\"6\xa2!\xfc\xcfj\xa6\xf6xd\xf8\xe5\b\xa5F\xe7\xe0\xdb\x8du \x9c\xfdU\x0e\xc8wZ\x8d\xda\x05\xb1\x0e\xe3\x1c_\xecp\x16\"\xccx\x9byd\x99J\x9a\xbc\x89p:\x11g\xd6o{<\xe5\xd42\xee\xcat\xf8E\x9a\xdb\xcf\xcc\xd6\fp\xbd\x0ev\xd9\xc2\xd1\xd3\x17\xcb`\x92^\xeb]\x82\x02;$\x19\xe2\x16A\x1a07<\xd1\xe5\x15_s\f\xedgR\xf4\x10\xa9\x1f\xd6)\xea\x0f\xd5\x142.b\xee\xc0\xf5\xbc\x91j\xcdb\x05\x86\x85\xa0\x03\xb9#\x8d\xbb\xca\x89\xc4\xb2e\x05\xcc\v\x15%d;N#\x8b\xf0g\xd0\xf7fP\xae\x86\x84\f\xbe)\x15G\x9b\xd2L$\x03\xd1\x85!b\x1a\xb0\xc0]\x11\xa9/\xbcG\xdcC\xc3-\xf7\x88\xa2\xa0p\x1a\x9d\a\x90n\xed\xb8\xd6\"ZN$|\xb4F\xc8pq\xfcE\x1a\x06\x9c\xfd\xd0\xfc\x1d\xac\xea\xc4\x04\xbd\xb2\xca\xf8tqls\x1e\xdb<3\x11mxj\xd0J\xe5\xd0b\xa2\xd7\x98(\x19 \x94\'\xac\xc2\x84\x9egC\x10H\x99l\vB\xf1b\xd5w\xda3\xb4!\xd5\x1fQ&\xf1\x1d\xa5\x8e;\xa3\x16\xc1\xcf\x9cN\xfe \x9b\xef\x87\x19Zt\x95d\xba\x86t\xdc\x7f\xe4q\xf3\x02\xbd\x80\x8aJ\xfc\xaf1\xec\xde\x9e\b\xd1Pb\\\xa8\x8beXL\xc8GE\xfbt\xb6\xd0\x05\xcc\x9f\x8ae\x8c\a\x8e0\xe5\x11*$\xe8\xa0$W\xd7DQ\xf6Y\x9e\xaa\x0e\xa1/m\xf7\x1d\xe2\xab\x8c\x9e\'\x19o\x8e4~\xc9,\t\xa0\x892\xc0,\x15\x8e3\xb9\x0fex\xe0\x10\xda\x8ew\x0fy\xc6(\x17\xd6S\xbd)\n\xf4\xcf\xe3}\xe4\xca'}], 0xa, "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"}, 0x127b) 23:20:50 executing program 3: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000001c0)='./bus\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) r1 = socket(0x10, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xa0030, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}]}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x3}, {0x2, 0x2, r3}, {0x2, 0x1, 0xee00}], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r4}], {}, {0x20, 0x2}}, 0x54, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x200410, &(0x7f0000000340)={[{@nfs_export_on}, {@xino_auto}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './bus/file0'}}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@fowner_eq}, {@fsname={'fsname', 0x3d, '\xbe(+\\^&#\''}}]}) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYRES32=r2, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f167933"]) ftruncate(r5, 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000005c0)={0x0, 0x0, 0x9, 0x0, 0x0, [{{}, 0x0, 0xffffffffa0020000}, {}, {}, {}, {}, {{r0}, 0xbc9}, {{}, 0xb41a}, {{}, 0x7fb}, {{}, 0x8}]}) [ 436.982572][T11250] overlayfs: unrecognized mount option "mask=MAY_READ" or missing value 23:20:50 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e, 0x4}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:20:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000840)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x10001, @local, 0x1}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000100)="fee714b6a30c87ba80b754f10028e8b4641f4f7e0218f9c62b8aea4414a991f3b99d5ce263ecc6fb31373eaf8554ce38130854cdff4d536288dd6f89adfb3b2958ad93aec0b81cd1b1109dce80e4086cc729eb3c405c2e2393f191ed39346433b2c07e738069bcce58995f1df8abcd12308de4a35c3ba71db6a455e90dbed753b115546750a43cc961d15da56cc54998b0ae744fe7687f5969a5dd80b2b868a28d22873894f43f771b90be103f73ffd4d0bca4715e5f8eeef18542895ecd6d26", 0xc0}, {&(0x7f00000001c0)="7d2a94c2ba0df91ec2d3fb381e26810311c4e0ee12e295ff967155d68d6cd9dbb88fba694e757319ada19f6ee753694fe1b7ee263ae289614029c91c391c854bd5405e1ad49a5f4553722990c6a0a58f80a199e093f871ed319bc85ba86d65deee461a420ab98b1f86f8be155e52789117aa55174311ba1ed35703b26ebcd906f66eb8da941372381538e887ef209806f7f5a706de9fb0b5c13b84a6e8bf27e4c77e726c1280ff0ba2a760df49d069c380c235574125609b2ecbe8a7caa68a69ae49ca8d6353", 0xc6}], 0x2}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10000}, 0x1c, &(0x7f0000000400)=[{&(0x7f00000002c0)="24f675ec3f7f357af58ef513abb081c53ad3796d723ebeed2bed8c4e15", 0x1d}, {&(0x7f0000000300)="acf8e6dd0edd2afa26dc7aa4ac64fb633ff26181e95a008f10817f92763eec5c4a57c73958944327dacd45135429f4b6e51768da5d207fa3ade6bf2d6cbd9c0df55026f6791733f63426d6f034b7907bee9e19f818155687e7a1f5c6b5fde2427deb2d241bf3466d87c9ec77f1c0d7f0c2f03a27e11b1afe369c5a67e52cb8039bff513668e5a4c58e3ef509c10108a886d7354eaa047d618795f3a2b5e923380b070ea5e7e07738989d6b43204b385398e72c4c276d89318878630f21839920bad2fb5869fc9c2c1640c35833a9aed503efed2283e5dae05e1f5d3235bbb3e03603416205ad7fee6a016f571c30", 0xee}], 0x2, &(0x7f0000000440)=[@dstopts={{0xd8, 0x29, 0x37, {0x87, 0x17, '\x00', [@ra={0x5, 0x2, 0x8}, @enc_lim={0x4, 0x1, 0x1}, @generic={0x1, 0xa4, "d042765bd3b916a0c14c4d2db219f35bf73a1f1172ad9413ed67b06851da5af8b55f00452fa78fea6cdfffce4dd3bb426a8b5653c729c887a2bcd938bcaf6d953329488c392bc3297317a3210edaee042e4499c430efafa170a12bbdf903686a7ca08c380ad46faf56c7e6b4d55d94e3fae29919902ebf432c401bdfd04254e0c0fe9a91af49f21f204a2776c7ff785fee84497ceb92ce492b66b5f044e5115af883253d"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x1, 0xb9f, [0x8]}}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xffffffe0}}, @rthdr={{0x48, 0x29, 0x39, {0x2, 0x6, 0x2, 0xfc, 0x0, [@remote, @dev={0xfe, 0x80, '\x00', 0x24}, @private0={0xfc, 0x0, '\x00', 0x1}]}}}], 0x138}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000580)="0d12fe7c105c973aa8f6aba2ff7d29332a1cdef4fe483b7f316666943b492f7455f0e8077efb701484790b3d5f28b3c0ac11cb85e187ea39b2b8013328ea3861975baed84dcc855f591e7f03c8c94a387e3607d48c649b00102f18f7aada5a21813e2a4f27d7bb0f50", 0x69}, {&(0x7f0000000600)="0800cb7ed3f1fdbf932fa102f28a85be8813eaea0f17ca25671fc77690207bf7fd3761290e37c30d4714d7ab069e3b5e73ef3b9fed6a582dbc3e434517c43eaabd339f35deb8010c66816c", 0x4b}, {&(0x7f0000000680)="ca46ccccb24fbf38231fc0c2b8d49502f03270a94bde9badb114ce2387e0385a60127abc689cab7d631f28d1072dcb42d66be7656f35913ada99c4b7742beaa0e9958c734e73b08a0791f26da3ae03cfe858b0b32fdaad2d5d37cfa843c487d06334d388f68c424ba07814b91b36d79b6202c1528af2cc899a96dd82ea5d36", 0x7f}], 0x3, &(0x7f0000000740)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x5}}, @pktinfo={{0x24, 0x29, 0x32, {@remote}}}, @pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, @rthdrdstopts={{0x60, 0x29, 0x37, {0x6c, 0x8, '\x00', [@pad1, @calipso={0x7, 0x40, {0x0, 0xe, 0x7, 0x401, [0x2, 0x8, 0x9, 0x1000, 0x845, 0x6b, 0x1]}}]}}}], 0xc8}}], 0x3, 0x4001) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x18) 23:20:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='f2fs_file_write_iter\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) fchdir(r1) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000100), 0x2, 0x0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r2, r0, 0x0, 0x8000200000004) 23:20:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab0020abc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)={0xf18}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = dup2(r2, r3) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000300)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) read$FUSE(r5, &(0x7f00000103c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setregid(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x3}, {0x2, 0x2}, {0x2, 0x1, 0xee00}], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x54, 0x0) recvmmsg$unix(r2, &(0x7f0000004740)=[{{&(0x7f0000000500)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000580)=""/206, 0xce}, {&(0x7f0000000680)=""/146, 0x92}, {&(0x7f0000000740)=""/154, 0x9a}, {&(0x7f0000000800)=""/160, 0xa0}], 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="00000621"], 0x18}}, {{&(0x7f0000000900)=@abs, 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000980)=""/9, 0x9}, {&(0x7f00000009c0)=""/155, 0x9b}, {&(0x7f0000000a80)=""/1, 0x1}, {&(0x7f0000000ac0)=""/189, 0xbd}], 0x4, &(0x7f0000000bc0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}}, {{&(0x7f0000000c80)=@abs, 0x6e, &(0x7f0000002f00)=[{&(0x7f0000000d00)=""/223, 0xdf}, {&(0x7f0000000e00)=""/229, 0xe5}, {&(0x7f0000000f00)=""/4096, 0x1000}, {&(0x7f0000001f00)=""/4096, 0x1000}], 0x4, &(0x7f0000002f40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x100}}, {{&(0x7f0000003040), 0x6e, &(0x7f00000031c0)=[{&(0x7f00000030c0)=""/210, 0xd2}], 0x1, &(0x7f0000003200)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}, {{0x0, 0x0, &(0x7f00000033c0)=[{&(0x7f0000003280)=""/81, 0x51}, {&(0x7f0000003300)=""/183, 0xb7}], 0x2, &(0x7f0000003400)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f00000034c0)=@abs, 0x6e, &(0x7f0000004700)=[{&(0x7f0000003540)=""/112, 0x70}, {&(0x7f00000035c0)=""/4096, 0x1000}, {&(0x7f00000045c0)=""/114, 0x72}, {&(0x7f0000004640)=""/160, 0xa0}], 0x4}}], 0x6, 0x140, &(0x7f00000048c0)) syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f0000004900)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}], [{@smackfsroot={'smackfsroot', 0x3d, '/*'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_eq}, {@fowner_lt}, {@dont_hash}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@uid_gt={'uid>', r7}}, {@euid_lt={'euid<', r6}}]}}) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xa0030, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {}, 0x2c, {[], [{@permit_directio}]}}) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f0000000100)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r9) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x3, r6}, {0x2, 0x2, r8}, {0x2, 0x1, 0xee00}], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r9}], {}, {0x20, 0x2}}, 0x54, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_delroute={0x38, 0x19, 0x2, 0x70bd2a, 0x25dfdbff, {0x2, 0x10, 0x80, 0x5, 0xff, 0x2, 0xfd, 0x1}, [@RTA_UID={0x8, 0x19, r8}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @ILA_ATTR_IDENT_TYPE={0x5, 0x8, 0x20}}, @RTA_PRIORITY={0x8, 0x6, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="40000000490001002cbd7000ffdbdf250a003f00", @ANYRES32, @ANYBLOB="071f00000800020007000000140001"], 0x40}}, 0x0) 23:20:50 executing program 3: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000001c0)='./bus\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) r1 = socket(0x10, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xa0030, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}]}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x3}, {0x2, 0x2, r3}, {0x2, 0x1, 0xee00}], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r4}], {}, {0x20, 0x2}}, 0x54, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x200410, &(0x7f0000000340)={[{@nfs_export_on}, {@xino_auto}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './bus/file0'}}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@fowner_eq}, {@fsname={'fsname', 0x3d, '\xbe(+\\^&#\''}}]}) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYRES32=r2, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f167933"]) ftruncate(r5, 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000005c0)={0x0, 0x0, 0x9, 0x0, 0x0, [{{}, 0x0, 0xffffffffa0020000}, {}, {}, {}, {}, {{r0}, 0xbc9}, {{}, 0xb41a}, {{}, 0x7fb}, {{}, 0x8}]}) 23:20:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x0, 0x40, 0x5, 0x1, 0x0, 0x80000001, 0x10, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000000), 0x10}, 0x400, 0x81, 0x1, 0x9, 0x9, 0x8a11, 0x0, 0x0, 0xfffffffa, 0x0, 0x5}, 0xffffffffffffffff, 0x3, r0, 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) write(r0, &(0x7f00000000c0)="b15ae938d21998c162e3cea2e9f1bc08f10d8de179ceaf364953dbf843f88f6f187fba49d84dc653a42e77b53ee0d3114fc7fb172aa2675b7c66373c2cac1147f151544109d6e44754f37f0d256c670de2dbe1dae4cea7e76bd199ed084c5d99de8aabefd20bdaa3d6ebcbe90bbfce76b9bc087e4ce90016cb8dc4a970d580f14df5289ebd393300da03cb5da4cb34d31ee0414e324b9e9dcc1d2f609c2f1a057572347c2f801391fbf9b9b7309c1e36585af1f469c73830ce8255297e8ccda4015eba836e194802c3008e80e591ded6dc1d8168bb38c3f324a417696a45333ee0cfc1b58f", 0xe5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004e40)=[{{&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000002c0)=""/113, 0x71}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/231, 0xe7}], 0x3, &(0x7f00000004c0)=""/231, 0xe7}, 0x200}, {{&(0x7f00000005c0)=@qipcrtr, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000a40)=""/233, 0xe9}], 0x1, &(0x7f0000000b80)=""/83, 0x53}, 0x1}, {{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000c00)=""/9, 0x9}], 0x1, &(0x7f0000000c80)=""/35, 0x23}, 0x9}, {{&(0x7f0000000cc0)=@sco={0x1f, @none}, 0x80, &(0x7f0000002100)=[{&(0x7f0000000d40)=""/213, 0xd5}, {&(0x7f0000000e40)=""/243, 0xf3}, {&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000001fc0)=""/132, 0x84}, {&(0x7f0000002080)=""/101, 0x65}], 0x6, &(0x7f0000002180)=""/41, 0x29}, 0x4}, {{&(0x7f00000021c0)=@x25={0x9, @remote}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000002240)=""/175, 0xaf}, {&(0x7f0000002300)=""/46, 0x2e}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000003340)=""/118, 0x76}, {&(0x7f00000033c0)=""/3, 0x3}, {&(0x7f0000003400)=""/62, 0x3e}, {&(0x7f0000003440)=""/26, 0x1a}, {&(0x7f0000003480)=""/4096, 0x1000}, {&(0x7f0000004480)=""/34, 0x22}], 0x9, &(0x7f0000004580)=""/3, 0x3}}, {{&(0x7f00000045c0)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000004700)=[{&(0x7f0000004640)=""/49, 0x31}, {&(0x7f0000004680)=""/97, 0x61}], 0x2}, 0x8001}, {{&(0x7f0000004740)=@pppol2tp, 0x80, &(0x7f0000004a80)=[{&(0x7f00000047c0)=""/249, 0xf9}, {&(0x7f00000048c0)=""/74, 0x4a}, {&(0x7f0000004940)=""/48, 0x30}, {&(0x7f0000004980)=""/69, 0x45}, {&(0x7f0000004a00)=""/3, 0x3}, {&(0x7f0000004a40)=""/38, 0x26}], 0x6, &(0x7f0000004b00)=""/232, 0xe8}, 0x8001}, {{&(0x7f0000004c00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000004d80)=[{&(0x7f0000004c80)=""/229, 0xe5}], 0x1, &(0x7f0000004dc0)=""/82, 0x52}, 0x100}], 0x8, 0x40, 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000340)={0x3, 0x0, [{0x2cf, 0x0, 0x8001}, {0x484, 0x0, 0x8}, {0x632, 0x0, 0x5}]}) sendmsg$nl_route_sched(r4, &(0x7f0000005100)={&(0x7f0000005040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000050c0)={&(0x7f0000005080)=ANY=[@ANYBLOB="1c6900003200200125bd94f0ff7000fbdbdf04000000000800040019"], 0x1c}, 0x1, 0x0, 0x0, 0x48004}, 0x800) ioctl$KVM_SET_LAPIC(r3, 0xc008ae88, &(0x7f0000000640)={"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"}) 23:20:50 executing program 3: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000001c0)='./bus\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) r1 = socket(0x10, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xa0030, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}]}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x3}, {0x2, 0x2, r3}, {0x2, 0x1, 0xee00}], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r4}], {}, {0x20, 0x2}}, 0x54, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x200410, &(0x7f0000000340)={[{@nfs_export_on}, {@xino_auto}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './bus/file0'}}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@fowner_eq}, {@fsname={'fsname', 0x3d, '\xbe(+\\^&#\''}}]}) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYRES32=r2, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f167933"]) ftruncate(r5, 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000005c0)={0x0, 0x0, 0x9, 0x0, 0x0, [{{}, 0x0, 0xffffffffa0020000}, {}, {}, {}, {}, {{r0}, 0xbc9}, {{}, 0xb41a}, {{}, 0x7fb}, {{}, 0x8}]}) [ 437.251411][T11261] fuse: Bad value for 'fd' [ 437.263256][T11263] overlayfs: unrecognized mount option "mask=MAY_READ" or missing value [ 437.277782][T11261] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 23:20:50 executing program 4: ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x27, 0x1a, 0xb, 0x1f, 0x8, 0x5, 0x6, 0x82}}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/374], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 437.325406][T11270] fuse: Bad value for 'fd' 23:20:50 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x400100, 0x0) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000001400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x3fa, 0x100, 0x70bd28, 0x25dfdbfd, {0x1, 0x1}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001480), r0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000001640)={'ip6gre0\x00', &(0x7f00000015c0)={'ip6_vti0\x00', 0x0, 0x29, 0xfc, 0x71, 0x19, 0x2, @local, @dev={0xfe, 0x80, '\x00', 0x3e}, 0x80, 0x1, 0x1, 0x7}}) getsockname$packet(r0, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000016c0)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)=@ipv6_deladdrlabel={0x78, 0x49, 0x100, 0x70bd27, 0x25dfdbfe, {0xa, 0x0, 0x0, 0x0, r7, 0x5}, [@IFAL_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}, @IFAL_LABEL={0x8, 0x2, 0xe}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @remote}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40010}, 0x44) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r7, @ANYBLOB="0000400000000082280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800000014002101002000000000000002000000", @ANYRES32=r7, @ANYBLOB="08000400ffffffff08000200e0"], 0x28}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001700)={'vcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000018c0)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001880)={&(0x7f0000001740)={0x10c, r1, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0xc000}, 0x24000000) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/4096}) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b705000000007e0500"/24], &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x48) 23:20:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x2, 0x0, 0x0, 0x80000000, 0x0) sched_setattr(r0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x80000000, 0x7, 0x1, 0x0, 0xf2e0, 0x1}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x10000051, 0x4, 0x1, 0x0, 0x0, 0x0, 0x5c0, 0x482}, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0xfffffffffffffcec) getxattr(0x0, 0x0, 0x0, 0x0) creat(0x0, 0x40) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x8) getpid() r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(0xffffffffffffffff) bind$inet6(r3, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r4, 0x10099bb) sendfile(r3, r4, 0x0, 0x8000fffffffe) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141442, 0x1c8) ftruncate(r5, 0x87fff) [ 437.371672][T11273] overlayfs: unrecognized mount option "mask=MAY_READ" or missing value 23:20:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab0020bbc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:51 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e, 0x40000}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:20:51 executing program 4: ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f0000000040)={0x0, 0xff, [0x0, 0x400, 0x6, 0x0, 0x3, 0x9]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x4, @local, 0xfffffff9}, 0x1c) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000140)={0x0, 0x0, 0x89}) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x34, &(0x7f00000000c0)=0x81, 0x4) r3 = socket$packet(0x11, 0x0, 0x300) socket$inet(0x2, 0x0, 0x1f) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, 0x0) setsockopt$packet_int(r3, 0x107, 0x12, &(0x7f0000000000), 0x4) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="391cd4dd2d34"}, 0x14) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0xc) chdir(&(0x7f0000000280)='./mnt\x00') clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x51}, 0x33) read$FUSE(r1, &(0x7f0000000c40)={0x2020}, 0x2020) 23:20:51 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000440), 0x8, 0x4200) r1 = perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x2360}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x1, r5}, 0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r5, @ANYBLOB="01840010000000001400350073022470919d9891e500000000000000"], 0x34}}, 0x40) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000880)="231d94dbf5ef8f5b5a6ae5c81aab0c68848be032b123d931451199202c7fc4fce7524d824773ef137b44eb720b32c5081a3291310c5d4c9e98baf06da91264d9f3df89c5851fd062027361301e437387e5ff91334ea9f242c362df0d2ebbaefb1437064c", 0x64}, {&(0x7f0000000bc0)="1731eca503d6bd4c15cda171aa8b3cf9bad4755ec891a8d13e2b07d9da183b9eb6798d03fc015b73334ca584acad878ea1ead30238e440df48aba540cb1c4745427392ec36748343ba6e6104c4baa711f736fc82cd834cbf5ff68b1e43bfb0b6eafc8276ef171119dc71a1fa71f8bcb2c09ad117c045bc631271858c33137f62cb48baca44f3d8e1d4e358ae29bd96e0f4de676a8e61d1578c695dd8949e22ac499636f24989a5ef3af1fa41392b80c6aa151e19792707b58e8152071aa703ffc3", 0xc1}, {&(0x7f0000000cc0)="65f944d4bca8abf1f5eaace161f1ad93807fb9d5b95370b461e5f7b28c5639ce7387db59fb666e8ad5833d04bcef50337ae49aa3bc25522b3fe41ba328f24775efef1e08eaf96610364a16f1460a7c7ff4100b8763ed5fe575f41f48a54bd6a55c6d5e90b32e2512930b786d5d508187c777b5967a03bf9cb6705b640eca8d8c0b04da2977254686e4870ef7932398e7d23816078680b9cb32408f29253e5adb61a071dd2941cd75f9a7ca572ced06a9c600649f7fbe0048a8a765b52bd4c9e6f7f055d5bbfaf0", 0xc7}], 0x3, &(0x7f0000000ec0)=ANY=[@ANYBLOB="20000000000000000100c80001000000c1da65c4bc05c718889529e37c898a9a5d7c716fe646263812df678f246e292cead36a1d94b6dd15fe27f68bb53fbffc75b7ac708802c4fe36c78bcae730a74ab0b696da8168551af2e47910cc365d5975cbfd4b7ca372849d58eeb1741f0cd22c93bd40edc0eaade94d3cfb74730800000038543fc405007b2f8ffb81d12d8cf1445fb2163649fe47f6ea46af329b48a9838fbc1987a95fc848b17bca4f1e4a2530083ade86209890b903c04b12a90fe5dd9ae20c96a441e6e5f7a664dde7b36a5da01db08c91ec29aefeeb6f12dcf4eea05dcfa2364c1c0a0e7789b5fc40a92dfe395b926afa27c1447b4bdd5af9adba85db2749000062539afc88941a2225592e5f537d560506f801e658d8dff1a5a6357a1ae2483e22713882bb025db2d4662b0f33d894a8794b202134650e2eae1ac83de1ca7b211feca62a5f4297cc8c28695ebf9736b066c1b6e344698126f073dad3c00455b05c4050bb0c40c6a335177e4093bce6984fdfffff7badff7b10af245f2eba1f2fe201812d6c9b271c0548fc7d4802c6d569a7848a", @ANYRES32=r2, @ANYRES32=r3, @ANYRESHEX, @ANYRES16, @ANYBLOB="1c000000ebffffff010000000200ddff", @ANYRES32, @ANYRES32, @ANYRES32=0xee00, @ANYRES32=r4, @ANYRESDEC=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x58, 0x801}, 0x40000) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x70, r3, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6}}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000011}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0xf000) clone(0x84001080, &(0x7f0000000240)="ba32e238a0daf548e9333d8303bd49ac1d394675e667fccc261b79c34109e98ab713858017d7f2dd171816e2a721a49c2c08131a991cbdcd1867b8c3c81c554411390896bf6a8e4e783910930285079a725b83067e16d7b60f7130d16078b1cb34bcd4b887300c45d841b6238271448c37af2912daad0ad0e95fcdb9f187196ad2300bc80e28914a1c38e8013c45b54fc4147662e6c5886c8c9d97a5db78ad5153f63fa092a6a4adaa148a2a2ad90c28331f5486e531300141559ad252cacd1c2733d9032792d0c68e91c992304bc11e6f1b9f7117c70833da41010a2a3ad729f65adc397a7813f8f7", &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)="e069f47039c9fb45ca336a") r8 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r8, r6, 0x0, 0x8000200000004) 23:20:51 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open_tree(0xffffffffffffffff, 0x0, 0x8100) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x401, 0x0, 0xffffffffffffffdd, 0x81}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={r0, 0x6, 0x4, 0x1}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, 0x0) openat(r3, &(0x7f00000000c0)='./file0\x00', 0x208000, 0x0) chdir(&(0x7f0000000140)='./file0\x00') ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000040)=0x3) fremovexattr(0xffffffffffffffff, &(0x7f0000000380)=@known='trusted.overlay.redirect\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, {0x0, r5}}, 0x1000) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r6, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) 23:20:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab0020cbc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:51 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="6df1e93f57d5a69b9af6d39c13c7b5e5b4761ab0c8838e4ec7ad8f5b68635f981547940703627b0ccb5316a9c87071da5e894375ff6601cc7496b1d5e4536ad71c3901a43668fa097a35b1c7bd6739fa44e8c20b15d6d7b80050b1b21e01487a12e0aaa96e34429025ed2bb105e8b709e7b80a5e6995de53c4735b7d317bd2499d1f86bf5c97fb84caa1fdb6d9e1a029c4e5b07ffdd16f6f8ace5dd5e55d90cb13cbc787063e2b8b77865aa1c94d45145ae6a74e8126e5c16556dfe79ac00c44084c1389a64b0219312bf0b723a7adb7d916356a420720ba630f167dba991644832b314e3c27b3a5a8442a80"], 0x15) read$FUSE(0xffffffffffffffff, &(0x7f00000103c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xa0030, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[], [{@permit_directio}]}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)={{}, {}, [], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x2}}, 0x34, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000380), 0x288010, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '\xfb(}-.\x00'}}, {@access_any}, {@access_client}, {@access_user}, {@access_any}, {@version_L}, {@cache_loose}, {@afid={'afid', 0x3d, 0xf10}}, {@loose}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@subj_role={'subj_role', 0x3d, '%:)Y'}}, {@fowner_gt={'fowner>', r4}}, {@euid_gt={'euid>', 0xee00}}, {@audit}, {@context={'context', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) r5 = dup(r1) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f00006f1000/0x3000)=nil) write$FUSE_BMAP(r5, &(0x7f0000000080)={0x18}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYRES32=r6, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f167933"]) fgetxattr(r6, &(0x7f0000000040)=@random={'system.', '\xfb(}-.\x00'}, &(0x7f00000000c0)=""/134, 0x86) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 438.121745][T11299] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 23:20:51 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="6df1e93f57d5a69b9af6d39c13c7b5e5b4761ab0c8838e4ec7ad8f5b68635f981547940703627b0ccb5316a9c87071da5e894375ff6601cc7496b1d5e4536ad71c3901a43668fa097a35b1c7bd6739fa44e8c20b15d6d7b80050b1b21e01487a12e0aaa96e34429025ed2bb105e8b709e7b80a5e6995de53c4735b7d317bd2499d1f86bf5c97fb84caa1fdb6d9e1a029c4e5b07ffdd16f6f8ace5dd5e55d90cb13cbc787063e2b8b77865aa1c94d45145ae6a74e8126e5c16556dfe79ac00c44084c1389a64b0219312bf0b723a7adb7d916356a420720ba630f167dba991644832b314e3c27b3a5a8442a80"], 0x15) read$FUSE(0xffffffffffffffff, &(0x7f00000103c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xa0030, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[], [{@permit_directio}]}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)={{}, {}, [], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x2}}, 0x34, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000380), 0x288010, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '\xfb(}-.\x00'}}, {@access_any}, {@access_client}, {@access_user}, {@access_any}, {@version_L}, {@cache_loose}, {@afid={'afid', 0x3d, 0xf10}}, {@loose}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@subj_role={'subj_role', 0x3d, '%:)Y'}}, {@fowner_gt={'fowner>', r4}}, {@euid_gt={'euid>', 0xee00}}, {@audit}, {@context={'context', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) r5 = dup(r1) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f00006f1000/0x3000)=nil) write$FUSE_BMAP(r5, &(0x7f0000000080)={0x18}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYRES32=r6, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f167933"]) fgetxattr(r6, &(0x7f0000000040)=@random={'system.', '\xfb(}-.\x00'}, &(0x7f00000000c0)=""/134, 0x86) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 23:20:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)=@ipv6_deladdrlabel={0x78, 0x49, 0x100, 0x70bd27, 0x25dfdbfe, {0xa, 0x0, 0x0, 0x0, r4, 0x5}, [@IFAL_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}, @IFAL_LABEL={0x8, 0x2, 0xe}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @remote}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40010}, 0x44) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000082280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800000014002101002000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e0"], 0x28}}, 0x0) r5 = fsmount(0xffffffffffffffff, 0x1, 0x0) sendmsg$nl_route(r5, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@getroute={0x14, 0x1a, 0x100, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040004}, 0x4000000) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@bridge_newvlan={0x60, 0x70, 0x100, 0x70bd2a, 0x25dfdbfb, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x4, 0x3}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xc}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x2}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0x9}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0xc154}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@bridge_newvlan={0x98, 0x70, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x31, 0x1}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0x8}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8, 0x1, 0x80000000}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x3}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0xfffd}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x1}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x4}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_CMD={0x8, 0x2, 0x11}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x1}}]}, 0x98}}, 0x5) 23:20:51 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="6df1e93f57d5a69b9af6d39c13c7b5e5b4761ab0c8838e4ec7ad8f5b68635f981547940703627b0ccb5316a9c87071da5e894375ff6601cc7496b1d5e4536ad71c3901a43668fa097a35b1c7bd6739fa44e8c20b15d6d7b80050b1b21e01487a12e0aaa96e34429025ed2bb105e8b709e7b80a5e6995de53c4735b7d317bd2499d1f86bf5c97fb84caa1fdb6d9e1a029c4e5b07ffdd16f6f8ace5dd5e55d90cb13cbc787063e2b8b77865aa1c94d45145ae6a74e8126e5c16556dfe79ac00c44084c1389a64b0219312bf0b723a7adb7d916356a420720ba630f167dba991644832b314e3c27b3a5a8442a80"], 0x15) read$FUSE(0xffffffffffffffff, &(0x7f00000103c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xa0030, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[], [{@permit_directio}]}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)={{}, {}, [], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r3}], {}, {0x20, 0x2}}, 0x34, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000380), 0x288010, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '\xfb(}-.\x00'}}, {@access_any}, {@access_client}, {@access_user}, {@access_any}, {@version_L}, {@cache_loose}, {@afid={'afid', 0x3d, 0xf10}}, {@loose}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@subj_role={'subj_role', 0x3d, '%:)Y'}}, {@fowner_gt={'fowner>', r4}}, {@euid_gt={'euid>', 0xee00}}, {@audit}, {@context={'context', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) r5 = dup(r1) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f00006f1000/0x3000)=nil) write$FUSE_BMAP(r5, &(0x7f0000000080)={0x18}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYRES32=r6, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f167933"]) fgetxattr(r6, &(0x7f0000000040)=@random={'system.', '\xfb(}-.\x00'}, &(0x7f00000000c0)=""/134, 0x86) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 23:20:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)={0xf18}) r3 = open_tree(r2, &(0x7f0000000680)='./file0\x00', 0x9800) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0400900a08000700fe01000008000a00ff010000060006004e240000140003000101000006000000010001001000000008000400618a00000a000200bbbbbbbbbbbb0000080001000a01010108000a0000000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) splice(r3, &(0x7f0000000180)=0x2e5, r4, &(0x7f00000001c0)=0x9, 0x5, 0xc) r5 = syz_open_dev$ptys(0xc, 0x3, 0x0) dup2(r5, r1) r6 = dup2(r5, r0) syz_open_pts(r6, 0x400000) r7 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x100000000) signalfd4(r7, &(0x7f0000000640)={[0x9]}, 0x8, 0x80800) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, 0x22, &(0x7f0000000240)="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"}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000006c0)={0x1000, 0xfff, 0x10000, 0x0, 0x781}) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r8 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r8, r0, 0x0, 0x8000200000004) openat$cgroup_ro(r0, &(0x7f00000000c0)='freezer.state\x00', 0x0, 0x0) 23:20:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab0020dbc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) [ 438.395791][T11323] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=112 sclass=netlink_route_socket pid=11323 comm=syz-executor.3 [ 438.416215][T11323] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=112 sclass=netlink_route_socket pid=11323 comm=syz-executor.3 23:20:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0xb, 0x2, &(0x7f0000000280)=@raw=[@call={0x85, 0x0, 0x0, 0x21}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)=@ipv6_deladdrlabel={0x78, 0x49, 0x100, 0x70bd27, 0x25dfdbfe, {0xa, 0x0, 0x0, 0x0, r3, 0x5}, [@IFAL_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}, @IFAL_LABEL={0x8, 0x2, 0xe}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @remote}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40010}, 0x44) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000082280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800000014002101002000000000000002000000", @ANYRES32=r3, @ANYBLOB="08000400ffffffff08000200e0"], 0x28}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x9, [@volatile={0x2, 0x0, 0x0, 0x9, 0x4}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x10, 0x3}]}, @volatile={0x9, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x30, 0x2e, 0x30, 0x61, 0x16, 0x30, 0x30]}}, &(0x7f0000000100)=""/43, 0x4d, 0x2b, 0x1}, 0x20) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r6, 0x401870c8, &(0x7f0000000040)={0xf18}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0x4, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3f}, @ldst={0x0, 0x0, 0x6, 0x7, 0xb, 0xfffffffffffffffc, 0x1}, @generic={0x1, 0xb, 0x6, 0x3, 0x3ec}], &(0x7f0000000040)='syzkaller\x00', 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x16, r5, 0x8, &(0x7f0000000180)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x3, 0x16, 0x100}, 0x10, 0x0, r6}, 0x78) [ 438.435237][T11326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=112 sclass=netlink_route_socket pid=11326 comm=syz-executor.3 23:20:52 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e, 0x1000000}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:20:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) pwrite64(r2, &(0x7f0000000000)="95215fa030299d46", 0x8, 0x6d6e) sendfile(r2, r0, 0x0, 0x8000200000004) 23:20:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) link(0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x316d, &(0x7f0000000140), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x6020, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x28c}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0), 0x0) unlink(&(0x7f0000000500)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') mount$overlay(0x0, &(0x7f0000000580)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000), 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB='index=off,subj_role=@[]),euid<', @ANYRESDEC, @ANYBLOB=',uid>', @ANYRESDEC, @ANYBLOB=',obj_type=sysfs\x00,measure,euid=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',dont_hash,seclabel,defcontext=unconfined_u,\x00']) chdir(&(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00') creat(&(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000700), 0x400) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 23:20:52 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="1500002c65ffff0180000008003950323030302e75"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) read$FUSE(r3, &(0x7f00000103c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xa0030, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[], [{@permit_directio}]}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r6) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x3, r4}, {0x2, 0x2, r5}, {0x2, 0x1, 0xee00}], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r6}], {}, {0x20, 0x2}}, 0x54, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x1000000, &(0x7f0000000480)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0xffffffffffffffe0}}, {@cache_none}, {@access_uid={'access', 0x3d, 0xee00}}, {@loose}, {@version_L}, {@posixacl}], [{@audit}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, r4}}]}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_uid}], [], 0x6b}}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0400900a08000700fe01000008000a00ff010000060006004e240000140003000101000006000000010001001000000008000400618a00000a000200bbbbbbbbbbbb0000080001000a01010108000a0000000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) dup(r7) chdir(&(0x7f0000000080)='./file1\x00') chmod(&(0x7f0000000000)='./file0\x00', 0x0) 23:20:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab002fabc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:52 executing program 1: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000025c0), 0x2, 0x0) write$cgroup_pressure(r1, &(0x7f0000002ac0)={'full'}, 0x2f) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x40300, 0x0) syz_mount_image$fuse(&(0x7f0000006500), &(0x7f0000006540)='./file0\x00', 0x0, 0x0, 0x0, 0x806000, &(0x7f0000004140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x2000}}) splice(r0, 0x0, r2, 0x0, 0x50, 0x0) [ 439.010814][ T22] audit: type=1400 audit(1637018452.370:49673): avc: denied { mounton } for pid=11341 comm="syz-executor.3" path=2F726F6F742F73797A6B616C6C65722D746573746469723138373136333134362F73797A6B616C6C65722E7A775364616A2F3434332F131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 23:20:52 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000200)=0x8, 0x4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xd0, &(0x7f0000000000)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000b40)) [ 439.010953][T11344] overlayfs: unrecognized mount option "subj_role=@[])" or missing value 23:20:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r2, r0, 0x0, 0x8000200000004) 23:20:52 executing program 1: sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x3, 0x8, 0x404, 0x0, 0x0, {0x3, 0x0, 0x8}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}]}, 0x54}, 0x1, 0x0, 0x0, 0x4010}, 0x80001) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000003180)={0x0, 0x0, &(0x7f0000003140)={&(0x7f0000002e80)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @in=@multicast1, {@in=@private, @in6=@mcast2}, {{@in=@private, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@tmpl={0x44, 0x8, [{{@in=@loopback}, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}]}, 0x16c}}, 0x0) 23:20:52 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x801412, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') poll(&(0x7f0000000040)=[{r0}], 0x1, 0xff) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x1805002, 0x0) 23:20:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xb, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000180)={0x38, 0x2, 0x3, 0x8, 0x1, 0x1f, 0xf0, 0xfffffffffffffffc, 0x100, 0x1}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000007c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000840)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000400)=""/144, 0x90}, {&(0x7f0000000600)=""/217, 0xd9}, {&(0x7f00000004c0)=""/65, 0x41}], 0x3, &(0x7f0000000700)=""/144, 0xffffffffffffff0a}, 0x80000000}], 0x2, 0x0, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000540)='./file0\x00', 0x102) write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x100e) syz_open_procfs$userns(0x0, &(0x7f0000000240)) sched_setattr(r0, &(0x7f00000003c0)={0x38, 0x1, 0x1000006f, 0x0, 0x3f, 0x9, 0x0, 0xb, 0x0, 0x1}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_KEY(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x400, 0x70bd26}, 0x14}, 0x1, 0x0, 0x0, 0x2004c000}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='rpc_pipefs\x00', 0x0, 0x0) 23:20:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000240)={0x0, 0x8, 0xfffffffffffffeff}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000640)={r2, 0x9, 0x5, 0x1}) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r3, r0, 0x0, 0x8000200000004) [ 439.173039][T11349] overlayfs: unrecognized mount option "subj_role=@[])" or missing value 23:20:53 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x4, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:20:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab002fbbc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:53 executing program 3: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) timer_create(0xfffffffffffffffc, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}}, &(0x7f0000000140)) 23:20:53 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "d8f895c9bd834ce1c8f30fbab1904c71ac475712eaea8e260f4ecb825fb1e522ca80fb6f6a72fc2095fbbf98a3db96b19648c034b9a4166e24e7abc7988dc4cd", 0x23}, 0x48, 0xfffffffffffffff8) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "e24ede7d196ba9bc8326267d9ba47fd1851d548bc9a7edc37629db609f819d79c40e461107cff573ebc3f7df893f191ca55f7b97e0e4dbfa7d341d8f73222cf0"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r1, 0x100) keyctl$get_security(0x11, r0, &(0x7f0000000240)=""/239, 0xef) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) r4 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r4, r2, 0x0, 0x8000200000004) 23:20:53 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(r1, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000300)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) read$FUSE(r4, &(0x7f00000103c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xa0030, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {}, 0x2c, {[], [{@permit_directio}]}}) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000100)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x3, r5}, {0x2, 0x2, r6}, {0x2, 0x1, 0xee00}], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}], {}, {0x20, 0x2}}, 0x54, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@polexpire={0x418, 0x1b, 0x200, 0x70bd28, 0x25dfdbfc, {{{@in=@loopback, @in=@remote, 0x4e23, 0x0, 0x4e24, 0xef5, 0x2, 0xe0, 0x80, 0x2, 0x0, r5}, {0x1, 0x4, 0x7ff, 0xffff, 0xff, 0xb60, 0x7, 0x7a0}, {0x8, 0x4, 0xfadc, 0x101}, 0x3, 0x6e6bb2, 0x2, 0x0, 0x3, 0x2}, 0x3f}, [@policy_type={0xa}, @migrate={0x1cc, 0x11, [{@in6=@mcast1, @in=@dev={0xac, 0x14, 0x14, 0x29}, @in=@local, @in=@private=0xa010100, 0x3c, 0x0, 0x0, 0x3504, 0x2, 0xa}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@mcast2, @in6=@remote, @in=@private=0xa010100, 0x33, 0x4, 0x0, 0x3501, 0x2, 0x8}, {@in6=@private1, @in6=@empty, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x2b, 0x2, 0x0, 0x3505, 0x2, 0x2}, {@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@mcast1, @in=@remote, @in=@local, 0xff, 0x0, 0x0, 0x3505, 0xa, 0xa}, {@in=@empty, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@private=0xa010101, @in=@private=0xa010100, 0x6c, 0x2, 0x0, 0x3503, 0x2, 0x2}, {@in=@multicast1, @in=@multicast1, @in6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x10}}, @in=@loopback, 0x0, 0x1, 0x0, 0x0, 0xa, 0xa}]}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd2c, 0x70bd25, 0x70bd27, 0x70bd2c, 0x10000, [0xfffffff9, 0x81, 0x4, 0x3c53, 0x2, 0x4]}}, @tmpl={0x144, 0x5, [{{@in=@multicast1, 0x4d3, 0x3c}, 0x2, @in6=@local, 0x3506, 0x1, 0x1, 0xfd, 0x400, 0x6, 0x14}, {{@in=@multicast2, 0x4d3}, 0xa, @in=@local, 0x3506, 0x2, 0x3, 0x2, 0x3, 0x3f, 0x6}, {{@in6=@empty, 0x4d4, 0x6c}, 0xa, @in6=@ipv4={'\x00', '\xff\xff', @empty}, 0x0, 0x0, 0x2, 0x3, 0x5, 0x6, 0x3}, {{@in=@rand_addr=0x64010101, 0x4d5, 0xff}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x11}, 0x3503, 0x2, 0x3, 0x4, 0xfffffff9, 0x7, 0x9}, {{@in=@private=0xa010101, 0x4d4, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x34}, 0x3502, 0x4, 0x2, 0x7f, 0x7, 0x4, 0x8}]}, @proto={0x5, 0x19, 0x32}]}, 0x418}, 0x1, 0x0, 0x0, 0x1}, 0x40001) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r8 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x8386, 0xa}, {0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x10000}, {0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@private1, 0x0, 0xff}, 0xa, @in=@remote, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffd}}, 0xe8) sendmmsg(r8, &(0x7f0000000480), 0x2e9, 0x0) 23:20:53 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000080)={0x0, 0x19, "bbdd83c9ad21cd4d8375ce513914ac9acb5cbab8d6b8a83e6f"}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@loopback, @ipv4={'\x00', '\xff\xff', @remote}, @dev={0xfe, 0x80, '\x00', 0xe}, 0x9, 0x0, 0x3ce4, 0x100, 0x1, 0x1}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)={0xf18}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), r0) sendmsg$NL80211_CMD_ABORT_SCAN(r0, &(0x7f0000000980)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)={0x20, r5, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x2, 0x46}}}}, ["", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x4040) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000480), r4) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f0000000700)=ANY=[@ANYBLOB="00001f00", @ANYRES16=r6, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x40) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0x20000}, @nl=@unspec, @xdp={0x2c, 0x2, 0x0, 0x2}, 0xf515, 0x0, 0x0, 0x0, 0xd779, &(0x7f0000000140)='bridge_slave_1\x00', 0x5, 0x400, 0x3ff}) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000580)={0xb8, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x4}, @NL80211_ATTR_MAC_ADDRS={0x70, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}]}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_ACL_POLICY={0x8}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40040}, 0x20000800) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r6, 0xd09, 0x70bd2b, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_LINK={0x8, 0x1, r7}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_NET_NS_FD={0x8}, @GTPA_NET_NS_FD={0x8}, @GTPA_FLOW={0x6, 0x6, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback, 0x0, 0x1100}}) r8 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000009c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r8, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x50, 0x0, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffffc01}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000000) 23:20:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r2, r0, 0x0, 0x8000200000004) 23:20:53 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(r1, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000300)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) read$FUSE(r4, &(0x7f00000103c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xa0030, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {}, 0x2c, {[], [{@permit_directio}]}}) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000100)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x3, r5}, {0x2, 0x2, r6}, {0x2, 0x1, 0xee00}], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}], {}, {0x20, 0x2}}, 0x54, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@polexpire={0x418, 0x1b, 0x200, 0x70bd28, 0x25dfdbfc, {{{@in=@loopback, @in=@remote, 0x4e23, 0x0, 0x4e24, 0xef5, 0x2, 0xe0, 0x80, 0x2, 0x0, r5}, {0x1, 0x4, 0x7ff, 0xffff, 0xff, 0xb60, 0x7, 0x7a0}, {0x8, 0x4, 0xfadc, 0x101}, 0x3, 0x6e6bb2, 0x2, 0x0, 0x3, 0x2}, 0x3f}, [@policy_type={0xa}, @migrate={0x1cc, 0x11, [{@in6=@mcast1, @in=@dev={0xac, 0x14, 0x14, 0x29}, @in=@local, @in=@private=0xa010100, 0x3c, 0x0, 0x0, 0x3504, 0x2, 0xa}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@mcast2, @in6=@remote, @in=@private=0xa010100, 0x33, 0x4, 0x0, 0x3501, 0x2, 0x8}, {@in6=@private1, @in6=@empty, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x2b, 0x2, 0x0, 0x3505, 0x2, 0x2}, {@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@mcast1, @in=@remote, @in=@local, 0xff, 0x0, 0x0, 0x3505, 0xa, 0xa}, {@in=@empty, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@private=0xa010101, @in=@private=0xa010100, 0x6c, 0x2, 0x0, 0x3503, 0x2, 0x2}, {@in=@multicast1, @in=@multicast1, @in6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x10}}, @in=@loopback, 0x0, 0x1, 0x0, 0x0, 0xa, 0xa}]}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd2c, 0x70bd25, 0x70bd27, 0x70bd2c, 0x10000, [0xfffffff9, 0x81, 0x4, 0x3c53, 0x2, 0x4]}}, @tmpl={0x144, 0x5, [{{@in=@multicast1, 0x4d3, 0x3c}, 0x2, @in6=@local, 0x3506, 0x1, 0x1, 0xfd, 0x400, 0x6, 0x14}, {{@in=@multicast2, 0x4d3}, 0xa, @in=@local, 0x3506, 0x2, 0x3, 0x2, 0x3, 0x3f, 0x6}, {{@in6=@empty, 0x4d4, 0x6c}, 0xa, @in6=@ipv4={'\x00', '\xff\xff', @empty}, 0x0, 0x0, 0x2, 0x3, 0x5, 0x6, 0x3}, {{@in=@rand_addr=0x64010101, 0x4d5, 0xff}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x11}, 0x3503, 0x2, 0x3, 0x4, 0xfffffff9, 0x7, 0x9}, {{@in=@private=0xa010101, 0x4d4, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x34}, 0x3502, 0x4, 0x2, 0x7f, 0x7, 0x4, 0x8}]}, @proto={0x5, 0x19, 0x32}]}, 0x418}, 0x1, 0x0, 0x0, 0x1}, 0x40001) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r8 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x8386, 0xa}, {0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x10000}, {0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x1}, {{@in6=@private1, 0x0, 0xff}, 0xa, @in=@remote, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffd}}, 0xe8) sendmmsg(r8, &(0x7f0000000480), 0x2e9, 0x0) 23:20:53 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x40020800) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) pselect6(0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x20000000000004}, 0x0, &(0x7f00000003c0)={0x77359400}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) io_submit(0x0, 0xa, &(0x7f0000001c40)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x4800, 0xffffffffffffffff, &(0x7f0000000380)="5403c501c021cae1f51ca19bbadcbed87489efc0a36702477ca73fe8fc7af8", 0x1f, 0x6, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f00000005c0)="315c3c35ee41e1f298d18361f2eed86d9c46f57458014a974c4d90058896f6c983a832af30061db1a1556786c5d53012b7b93bf18d2b7469152f1552b304bfe058e73af516fb5d84359ca7cb4d63a2e4ee38488802a29f83135adb8c7dfe2381cf8fe0257b5cd4eb7491a05cb29b5a9471927d45bd64f348b45d47f4c5bfc95b099b850bdcac40116e596cc5a909e5fc548ee252703b9cc2098d154b0363eb7b02af0e4da37baf4778ca7ac2ff3345668551b1cfc5d24b2cfcce31fa664959b08d66bf6a40f51b5921107d04caff21034b784a52aebd2882f8d3858cd03dd6e0daabd542aea639e4999307891dacd97ae187056e82a2a517de4d453e43f82240b6c8d812a81bc53b422b811f14b69865266d783eccaa98656fc1b9cfdebd6a9923ffdf7002e03ae4666eb450cb57be2863a7bd13ef804fbc2b21c29af9f6c9c07f05846e9aabd3930f67096a261360b9a628f2d40964562787b90ae8a65f33d107c8067af270dd00ecbf1a26a6c2325447d8147d8909bfb700fedfdeeb27387c9264c0e447ed9c3f9a41b51e9e41b9f4c8824345dba2fc73a8c845d1dd784a00a07ac6ac6fabd4e1b8d63a4426406a9f991791d6ae29dd63c39734e891c9374ebae57ead46fc8daff6bb26a3d8f213d8adb533c3bc2b69c861dc2ae9058d29b3dd7767e9c0931f3ff060979066cfcc233212d7a6d6873dedc41b51346ff48caa39e19cc41f8a8e0526e9fa1031ee6fc5d522a5a4071140a05b972e4620d5d862471b8919d98787573ee34aa89081256de1a0a71e58ff5a3226005b8624fbd9695f429a50eac8f786d08bf61972e16c4c9d82d236db8f49b95c037e43ca8c9d9216e35ee015eb56eff90a1afdd77fcdd017fd3d5e7b3d082a4d7dc5a2bd9c8cb5fc79874584a7ba600c6785a4b31b39ef36ce564e10bb57b16fb09469225d2212db037859403927310f509492347f5d3938e902c84e0f2ee83b9462b7434ac1392e793c0d32821551f563f3e783eb5ea9e1372b3b123944420d3db0eb62a24d1c7333c10f6ffd3cd721cea2d3f2ea8a7e42bfcad7255c5628cc05ac9af3514acfd2405f7a2285ceb6b73fdd5167b55a11fceab162976ab78bd358e4605a8b9efc2b948ce599226a62b1d89bf94641d923db916d38d7020a7f2ac4701be66762ff19b7e255c592e3f4c62d897833fe76bbf065b11df390e0d5d315c93a129521221575947a52a0ca8be4dd2293fa62f2c3ff8e212a8bae51c6b1b2daf8ba4219f1d0f76d3f3fb5216f9802cd91f97cc5f05dba8d76c6d464e582ce027f9b7cdcb9f5ba3cf0f9e34e6619791aba7c8316c83bced782be9761afea1a393af2685165023e64f4392c101ba755bb087a759e091242f7c616f2391550d442de0ebb68f10da21c7228af79de83c25c4e2d1c96169fb7789db26c70e5a066a07f4c3cea2bf8086c3a83f93d0fff074ad2db5ef0e3e664170ea4ffe9924dec276e1a9f0414f77a98f75e241aae47fafbbc536d634cb25f57491003ebcc3edbc1a08770f5b69b427b2dcbf641fadfc254d6eab28a9411f05eb8dd027fa80f1762f96dbfa8af9d8d2ad1a8829507bece26fb28815af645ba1a9c8b9341262313234369d2c439de89a8fbb212058fa9fc5b6a7adfaffa917716c63e9ae8486ff389f28cd3e52532f70b773fbd5a347179e8756007c9793bc7f11880439cab6a98bde44619152dab99afed6d14875ab9051710bac03968623f9ddf3242565d986df878a5072b9b8399887b6dd152467dd679f5fa48ab9fbf63f12c2e7f60e98e182c7eab4f2f71191711b8d7da9d7f3535f9d5ffa9752315fad0ba4ab2e179a361be8d1c9d981f5d23714991b951def640d3ab5a7948e64c22b5ab31a26627ecf7e55e5ea18ad77f746ec7464dda0c9ae1afb48b11ee3776651aa08a211f0e008c5d482834825cd5716b803eacb837e7ed69caafc7d1a59a4fefc13b5f0e695fa22f8087c67e868bd2a0b4bff6f5f3febe0d698542f6a0cb4cc17ffdbc9230531a1741d2dcdfc8b273ccdb58228eae76f96cbcf0028fd68ae414fe0820922d493bb3fa0a822adeefd04244b94bcf81888d2bb74638dd15bbcdc43a9cbeda380d93fed252d3b10960d07edc9554b1ee6066fef2f56af7885510104e4fd1b6d5157f551472d701a05afc54eb107ce67a62a9d3a801c2186a40f199cf503889889a6e70ec3d500e786279ef0ae65acd88cf5f6a3802bba6aa6255e9873ccbcfa1b3381fe167c36a56896895de5aab81eaea4846137af4b7298ef7112133b6327b733a61fbf0763de63fe2a09d99c8311e154a5e38a6191869c0ec80107f283e05230f5b836ab4dbc91f32474de6560e55635b5f82edeb1331e5e21bb1b7aac334cec05f94d97af891e2467a8d753fb672f2a8f002f45c70f1b9102ca9ddd8cb9ec6d8f3d97c99b22c63b4b5bc819e2751fc7036dc7c65796f990a6dcdd7fb71f294acd1948a0b72bc9f63c8764da24e843469fe78b201ce42807697bd777d9c21e1e9588bc6da8f2a7f6088500ba906284efdf5b61b3b503c684b14d42eac2851121f8d1ac217efc403efde07e4d792438eb17f2aac77b971b7ff58224c3cb866f6c7d70f3f2d572943ead156588e114c772c2e1a29126229ba7a95c35ebb94100316c7f262aa66d041a0b0e9fcd13668b06d0f60a4669952e1109dea4f7a41d47fd4d77bd53e38768c313611c9d0063446f7bab6fdb39a27ecd5de78ef4d7dfa4d49b9be2378c292a554aa62fe92b65e167d74eba6c8b26ff7fce604af954db6fe4ff0183777b9456224906a559610b28b2fa3a2a04e3e4d7c5275f11c8f0786f32bf0bea2faeb044239be2cc4cdee70b0a21656d780ab3e0860e3c633dfd2a19e4cabd05591ca80b54d51f0e0052b121a4ea5498d55b01a0e945f90709dd7506301f8ff38451a400daa90ce1ffd2db0df3ed7d4539f2dab91c8297ac6bf10a0d78c83d2fd5e81194136dced76fd2b18ccf4bacc7a37b5ad39533820280f6427cccd40a0f12ab3bc250e65a5404535f6b9d6bec9b47a14a6c2db6f0021855ad1d720594db0b3defbcbd11b83441d031033e90dda367be89bcb75b972dd9872b96d66d822796809249081b4382371386743935c34b3dba15189b775dd19310d2a9877796561e3aff151979a80cce0b363015d88963150e07932e3351093949b34c2e7b30d567c175e80c39f5c472ae56be153aedea9b52cd1e75dea75d68802bc301036efd0d0118e8482ee5905ea51c54a8f4f9f2dc6828391e1f62fc9aba3f2eb0d2722e2408214cec450e12e97efd3c09add7465b1b5b34b7a7867c991efc25cb0d361e0c55ccc0f5a3f761d14444509d60535d4cba0028fd9f3536b121e0c01257f80a70a61350dc1a344ca2e37b224c1835cdc42671b083ae393526896471646f181e0a43e1895a0e253d8b4c9e882574a06c56a2496fb24f367c0fc83f9d70bf94d088ea52c859ccc1201efe5e9e69b810234dc92c39e254412f3b8813b7e0a86bfde1aace3f13aa071ae509abd97a8d71dcbfb369002ee82eafa0db53337d8d85dd56ac66cab68f5ffe199c8e22b7c9db1c0f1a403345e3c8fa9c42532b59b11d1566b48d12591c0e9088de6183aa5fbdcb8823f098a6b879dee53a150143aa88716e60ce5a8224c4cc5d95e2f218eb0c870208dfe6644b56d71361ee3ffb058806f50b6f7ec09a63d35b801a0647206aae28c03642df2207256efb5e391b4a65bc79e4c564fe1c9d4599724395aa76e0dd5582470c96d5214e2a27f9bb41cc0bba2f68374c69808029180187586ed1b44200d4fd0e0bf1ba813e854a075062a4764468366ccd7126965eb1450ee91d87384be3bde7fbebdf5216516b1b7263c722ce898b8d204cb845728ae3b123cd33a3af3c06ebe603ac1f7082172def1f688d1aaf602621d72c607fe1ee91d45b20fd9bd0592e265dad29853533648049f1719ca153584e8966001e12c68c612cfc5adf8bcd1899b6ed91b15b77e8fb30a5dc0677490a125eb537ea2b7a2ad9dd1dad7f75f3ec8dd32dfe0610d2016d59b0744887f0dc106a1fd9856a20036ad8f01369b219d55d77f7dc5377532b09b62d77af31a88e71b4b265ca8b40072e154d3214922dd374610927ffd890f4782c9514e576cf3341a4e80abd1763f359190256d57a9ceef3e00d29380437526594ffb097cda5e2a1f3538bd572d5e767a3cfe1305481240bf2b7d7c84f816766e12807de5f349a02302882459173b723a8318b59404a1f2b5971decee70c58203bdb4df790b560fa1b41375c0f0a3c928f8bcf2f640f226568533c38bf7f5f41692bb9d7ee98b2fae77dcc17d3d39d1ca06d4f3ac8db45ac9fb8918821daa724cd1aedf59dbad0c290c1d29b5d34f2767d1d658f6f8777f230fe66133d6ef7a85faa6449e630ba7bddc1479a943399db4865bf9e98cb36bfe964ac2be89579b487ee56c7f6c472e15c1870aab4fafd7ac771a5abafda5f46fb93a7afdf8c93a1a686bba2d2eca008492d56cde2cab9ef84a3a71db55d338ea88bfb7cab475f08d120076234f96d8957b358a9520a8e72c0431870de107514b928b28733abf121dd6039d5f5b98f309948514a1bd53bde57ce7d8a255bdb6f237e42ba3f4cb5733f6250f3808ca39fbb8289e0564f6b39d47dec22e49ec162b4ac7fcca6166aaf3705d02765d0cc939c0ea1ed7dce687cd8a1679d85d6949eda49941d82ef4600e3c32bc8c6460b8264d53b1c7be2fe746870ba1a0c79a0e46eb04254a27b1411ef0a3804ff85a95f1ea17e47f1cf4342d95d4644a31457182907467cde08c3d3ccba0250f1e119b015e972cef2650696b0d2bde2950f5e29defdc9dc22adf63e10a3782cf4a9ecae0c238dc329fa6660bf43f621a6cf7a83263733679fe428039ff8fc2f0e917dadae7201659caea227f8e499b98c0a46e5713416dffc7d1434a047f25a296c9239c71ef34dd73aca066f1f74dbf3d93de049c13829eb105d68736ca3f45968ad80573e3b5a1e22a5de859637db807f8093ace4ca9e17a8a500299515b9c8d740c4b64071e2928d8e1e6f283634b889dccf5b63c6e17ed5355994d08fc6c21fd8d4c76c8f35913a12fe426f2c6c02d571650443941228c4032a5fa6684adf6d73cc25a61c416eef1da39dae299c1411eb01a24ada3dc75110ac6e832534ed560f4e85e52f2a406b2564310bf4cb3c379da968b771a4a99999c3a19ec85bad75d1fefba18917112524634b7632d7a46cac1dac7246bb3211a2c61b239dec62513b48447dd1d7ab39bf60695f8784ea455157024aade9fb06633a165fbc808e0efba2fdf1decbcaf9e7ebb655e3922478b38dcd6ecec2ca6adc709d2ab257c8a3d1771d908f2ae494ffd21c1a8a69519ce7460c52aad6a17d3b770e8d086cd4fdf8e847059e1ca8962b75434215f3da3debf9ed78c7a58e93bf5b7e98fe3bee37ca7607acbdd2c6bab38d18126aa512ad8f0c530a16ce8256bd4250a352acf8b6753ce78e23fa6193fdd7a84bc95cd990c02868a562b267c98e54a97dd59f7ce0b58700443847fc3fdde95dd610ab0b81f4d9882a02a209967c09376cd4bb0147b9f27e93d3ed87981e02446bb8c4d55e5a30af3df63b923537036d738b226d4dbbbabf2aba488a75648c13516840f0c979544f9aeaafd06f0d8c2a6bb0797603f577407519905ef1ad140cd442419fec28caa0c7ddf169b128089f3e72d84c1126bfb14b31e8cd20db9bc4834c5927332707be41082f0f1c989fcb0849990acf3", 0x1000, 0x0, 0x0, 0x3}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0xfd0b, 0xffffffffffffffff, &(0x7f00000015c0)="b160d3ca8ed53030d61f8e3dcaa20ee8fdbb262b4876ff2951889ad247b14be2f9ee92c30be8f679857002cf60250103ecefe89240bb9f1e622ecf43e2e5d7f4a1ac1210db1ec27e48a0c61141e3f13a2e7f4df7fd01881c7022afadac3a442160db232ba9b928cd6131a8fb634c19e9dcff6803a6b3f46264fd58b8b8a63530a1e33f3f94821793f25870d10062f79af65e18977c727103152eb9774a67ac9491c8de67", 0xa4, 0x4, 0x0, 0x1}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x6e99, 0xffffffffffffffff, &(0x7f0000001680)="b6895039d88e309acf170504c35a29b1def64687e682145304b61c8d1a0176ca5f1c212c1a3fa30159cc092d10eaa925ce0b11d386fe06cd27279dfec2c8e04a783962981b6b60578d438925eec900fe14e3802d93f6b4c732f6921f8f5ae80efddf95efd55e8f5e023282fa47583cf4909d07547200a4cd21c59d74558adc36832baca66518ec335b24a99a43d5372b8401f96d199744ed76d4bbde54d272e2b1df10c18575d25f9134a8a6282169b363d342b78585b2c1ffee33802d8e33b178d355bbcfd2a8ecc6", 0xc9, 0x0, 0x0, 0x2}, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x8, 0xdeb, 0xffffffffffffffff, &(0x7f0000001800)="f8f8c22f524fa4b9e3b16cb014899366653edf924e4e2506", 0x18, 0xcafa, 0x0, 0x1}, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x6, 0x2, r0, &(0x7f0000001880)="a453250d454494e7e4f140906bf710c4f6400ebb8b5ac106f6fac850ec6032f43803be1f2137e756d9aebe3b6d88117628c0b3db86463a10ba27f0c62378fc2016d2e3c6995cdf27f86ab3f9a6d76a1c32e22787536716626712e5964d8e47eb2ebbd2fe80698fb6041f88aa8fd6483c866fb3560b", 0x75, 0x3, 0x0, 0x6}, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x7, 0x3, r1, &(0x7f0000001940)="07e203f275b45ae069944bfb464f22", 0xf, 0x10001}, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x5, r0, &(0x7f00000019c0)="e9293441f068935139834de68bac58af088e6139c1f657c65975926a9c7b850d42ffac527cc061de69b8aa2478b1ceed2c8f988da1a0b8e5b4bb03b4e62d3b9ea5c4696a4f661b4460463f6ffef31e46609285da", 0x54}, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0xfcf, r0, &(0x7f0000001a80)="fc3e9d01a70b0091bdff9f130115cfd0c4d720ac933e71e0b2acf1cdc4f0092651690f2212eee71fccf07badb3789f0492b667e7471a20c78685f9b0377105ea588cef697281ed8b7f6c0fba7917760a6eb7cd8531742197c8", 0x59, 0x6}, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x8, 0x3, r0, &(0x7f0000001b40)="477ccf6b6e5916c5bf2a453feccd0dcde0ba594c4e4f96c2674914502f9f37e6f0f87344f07123b117405c160d0fc1e654833a2d3be4c4f3b993503c37834213f34c4246f05380499794b34a260e29694bd48d8985363d70aa911d7fdf3c4785512596c845961a4c6b1b31f4138e702e06545132ae9f643058e9d316ddcbed74caace2d4942b37a40ad4", 0x8a, 0x400, 0x0, 0x3}]) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) io_uring_enter(0xffffffffffffffff, 0x268f, 0xd45, 0x2, &(0x7f0000000580), 0x8) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000000040)=0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0xff, 0x1, 0x0, 0x2, 0x0, 0x25a, 0x10020, 0xf09a4493bc52bcc3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x73d4, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x3, 0x5, 0x8, 0x7fff, 0x401, 0x0, 0x0, 0x91}, r2, 0x4, 0xffffffffffffffff, 0x2) openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x880, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000240)={{0x77359400}, {0x77359400}}, &(0x7f0000000280)) timer_settime(r3, 0x0, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, &(0x7f0000000300)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000002000)={&(0x7f0000001d40)=@migrate={0x284, 0x21, 0x4, 0x70bd2a, 0x25dfdbff, {{@in=@loopback, @in=@rand_addr=0x64010101, 0x4e24, 0x7, 0x4e24, 0xfe00, 0x2, 0x20, 0x0, 0x84, 0x0, 0xffffffffffffffff}, 0x6e6bc0}, [@algo_crypt={0xef, 0x2, {{'essiv-cbc-aes-sha256-ce\x00'}, 0x538, "22b0849f7b90e7b6e7eb3ec5552e7deca98e361f993f0c113b021aa165ea5844becf6de7f9a05544663604f6037f40d89f18394cbde06078344f9ec2453b2422753e31a6bcb14dd3d48d70d0273420ed00aeb405fd5467ed6cc000d8ac5dff1a2952e9706f998bcb78cb80354cb6eac5bf0b3dfad11a1c7d58519da9eb092a4cd5575dc2421c1d4186d28e4a92794df1a0a19474e4bb4b95344d7dabf78a1a11d0f12cca04b142"}}, @address_filter={0x28, 0x1a, {@in=@dev={0xac, 0x14, 0x14, 0x41}, @in6=@mcast1, 0xa, 0x7}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x4e20, 0x4e24, @in=@empty}}, @proto={0x5, 0x19, 0x6c}, @etimer_thresh={0x8, 0xc, 0x7f}, @lastused={0xc, 0xf, 0x4}, @sa={0xe4, 0x6, {{@in6=@dev={0xfe, 0x80, '\x00', 0x30}, @in6=@loopback, 0x4e20, 0x80, 0x4e21, 0x4, 0x2, 0xa0, 0xa0, 0x33, 0x0, 0xee00}, {@in6=@empty, 0x4d2, 0x33}, @in=@local, {0x7, 0x4, 0x7fffffff, 0x9, 0x80000000, 0x4, 0x9, 0x100}, {0x2, 0xac55, 0x7, 0x9}, {0x6, 0x2, 0x5}, 0x70bd2d, 0x3501, 0x0, 0x0, 0x3, 0x84}}]}, 0x284}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) 23:20:53 executing program 1: r0 = getpid() sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1800000000000000, 0x0, 0x0, 0x0, 0x7000, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) syncfs(r1) dup(r1) 23:20:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x11, r5, 0x74bac000) 23:20:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000140)=0x6f, 0x4) bind$inet(r3, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) io_submit(0x0, 0x4, &(0x7f0000000540)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x1ff, 0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0, 0x0, 0x3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, &(0x7f00000002c0)="ee7ba9f90657ce92716ea27f08dc7cf6d4361adca4a1feb7703ccc774732c403a50df7565e889e4a6ac1f2d8f6ea6e431ab0cd7476fdfc279857c5f7b07aeff487365b846742b0384ce880e3878f7e2f78a2aa89b07f872a68db0421a7af90b062ff9ffdbe128537d719b68b17e891a4f5ef9fc7894bc2ac07397019f1114af65da69333783964ecf747e81fe2a29a7d070e61c21090059efba8686f5e7c25daa148e75c1d0aa6cd70d3af8b13ed62dfd36c68dfdd67558b1e4602325be28bd45d5c7a04d3fc24b7dc57434f9ee365434faac9fd7ffe2b0e10f2", 0xda, 0xfffffffffffffffd}, 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x1}]) open(&(0x7f0000000080)='./file0\x00', 0x400000, 0x120) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) setsockopt$sock_int(r3, 0x1, 0x2f, &(0x7f0000000040)=0xffffff48, 0x4) sendto$inet(r3, 0x0, 0x0, 0x2000473d, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x3}, {0x2, 0x2}, {0x2, 0x1, 0xee00}], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x54, 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000480), 0x12, &(0x7f0000000f80)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@smackfsroot}, {@fowner_gt}, {@context={'context', 0x3d, 'sysadm_u'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@euid_lt}, {@subj_type={'subj_type', 0x3d, '!.$'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, '^\xc1+!\'\x9d[\'@'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xad[}'}}]}}) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100)=0xc04, 0x4) sendto$inet(r3, &(0x7f00000012c0)="12268a927f", 0xad11, 0x2, 0x0, 0x80fa) [ 440.005129][ T22] audit: type=1400 audit(1637018453.370:49674): avc: denied { read } for pid=11408 comm="syz-executor.5" name=".pending_reads" dev="incremental-fs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 440.093267][ T22] audit: type=1400 audit(1637018453.370:49675): avc: denied { open } for pid=11408 comm="syz-executor.5" path="/root/syzkaller-testdir687284767/syzkaller.msS0vV/104/file0/.pending_reads" dev="incremental-fs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 440.123444][ T22] audit: type=1400 audit(1637018453.370:49676): avc: denied { ioctl } for pid=11408 comm="syz-executor.5" path="/root/syzkaller-testdir687284767/syzkaller.msS0vV/104/file0/.pending_reads" dev="incremental-fs" ino=2 ioctlcmd=0x6726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 23:20:54 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x40000, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:20:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0xc, &(0x7f0000000040)=0x7f, 0x4) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv4_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x20, 0x0, 0xda, 0x0, 0x0, 0xc8}}, 0x1c}}, 0x0) 23:20:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpu.stat\x00', 0x7a05, 0x1700) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000000)={0x3ff, 0x1f6, 0x4}) write$cgroup_int(r1, &(0x7f00000000c0)=0xffffffff, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r2, r0, 0x0, 0x8000200000004) 23:20:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab002fcbc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab002fbbc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="2000000014002101000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="080002fddf000002"], 0x20}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)=@ipv6_deladdrlabel={0x78, 0x49, 0x100, 0x70bd27, 0x25dfdbfe, {0xa, 0x0, 0x0, 0x0, r5, 0x5}, [@IFAL_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}, @IFAL_LABEL={0x8, 0x2, 0xe}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @remote}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40010}, 0x44) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r5, @ANYBLOB="0000400000000082280012000c00010076657468"], 0x48}}, 0x3000cff766836f7a) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800000014002101002000000000000002000000", @ANYRES32=r5, @ANYBLOB="08000400ffffffff08000200e0"], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=@RTM_DELMDB={0x118, 0x55, 0x8, 0x7fffffff, 0x25dfdbff, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x3, 0x1, {@ip4=@rand_addr=0x64010101}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x3, 0x0, {@in6_addr=@private0, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x5, 0x4, {@ip4=@empty, 0x8edd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x0, 0x4, {@ip4=@loopback}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x1, 0x4, {@ip4=@multicast2, 0x8edd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x2, 0x4, {@in6_addr=@private0={0xfc, 0x0, '\x00', 0x1}}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x4, {@in6_addr=@loopback, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x1, 0x1, 0x3, {@ip4=@local, 0x86dd}}}]}, 0x118}, 0x1, 0x0, 0x0, 0x20000000}, 0x20018000) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r7 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ftruncate(r7, 0x3) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000000240)=ANY=[@ANYBLOB="f8ffffffffffffff05000000000000000500000024b000000200000000000000080000000000000000020000000000000800000000000000000000000000000000000000000000000001000000000000000000000000000020000000000000000008000000000000f800000000000000000000000000000000000000000000000a33000000000000000047567b000000"]) sendfile(r7, r0, 0x0, 0x8000200000004) 23:20:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x11, r5, 0x74bac000) 23:20:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x11, r5, 0x74bac000) [ 440.858271][T11435] __nla_validate_parse: 5 callbacks suppressed [ 440.858278][T11435] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 440.954893][T11435] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 23:20:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x11, r5, 0x74bac000) 23:20:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab002fdbc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r2, r0, 0x0, 0x8000200000004) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x8000000000000000, 0x109202) sendmsg$NL80211_CMD_FRAME(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x1e}}}}, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8801}, 0x0) 23:20:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)=@ipv6_deladdrlabel={0x78, 0x49, 0x100, 0x70bd27, 0x25dfdbfe, {0xa, 0x0, 0x0, 0x0, r4, 0x5}, [@IFAL_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}, @IFAL_LABEL={0x8, 0x2, 0xe}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @remote}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40010}, 0x44) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000082280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[], 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="2000000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000200acad1414"], 0x20}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="ff06292d09c77a826c303ac800"/35, @ANYRES32, @ANYRES32=r5], &(0x7f0000000300)='GPL\x00', 0x7, 0x27, &(0x7f00000004c0)=""/39, 0x41000, 0x8, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x1, 0x6, 0x100}, 0x10, 0x90d8}, 0x78) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)=@setlink={0x4c, 0x13, 0x100, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, 0xc042, 0x40}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x6f2}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0xb078}, @IFLA_XDP={0x14, 0x2b, 0x0, 0x1, [@IFLA_XDP_EXPECTED_FD={0x8, 0x8, r6}, @IFLA_XDP_EXPECTED_FD={0x8}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="3cddff001000f3b0be753fd988be3bb72e93791f7979f6ffffffffffffff000000", @ANYRES32=r9, @ANYBLOB="01000000010100001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, r9}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @remote}]}, 0x28}}, 0x0) [ 441.065309][T11453] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 441.093335][T11453] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 23:20:54 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x1000000, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:20:54 executing program 3: write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x81, 0x0, 0x0, 0x0, 0x70d, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffe, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000280)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x3}, {0x2, 0x2}, {0x2, 0x1, 0xee00}, {0x2, 0x0, r0}], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r1}], {}, {0x20, 0x2}}, 0x5c, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000140)={{}, {}, [{0x2, 0x4, 0xffffffffffffffff}, {0x2, 0x1}], {0x4, 0x2}, [{0x8, 0x5, 0xee00}, {0x8, 0x4}, {0x8, 0x4, r1}], {0x10, 0x2}, {0x20, 0x1}}, 0x4c, 0x0) close(0xffffffffffffffff) setxattr$security_capability(0x0, &(0x7f0000000200), 0x0, 0x0, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f00000000c0)={0x1, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_READ_VERITY_METADATA(r2, 0xc0286687, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0}) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setresuid(0x0, 0x0, 0xee00) 23:20:54 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000032c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2, 0x14}, 0x1c, 0x0}}], 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r1, 0x2e, 0xce, 0x53c132ef) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="640000001000010428bd7000fddbdf2500000000", @ANYRES32, @ANYBLOB="41000100000000003c001280090001007866726d000000002c0002800800020001000000080002000000000008000100000000000800020004000000080001000400100008000300", @ANYRES32, @ANYBLOB], 0x64}}, 0x4040880) sendmmsg(r0, &(0x7f0000001ac0)=[{{&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x2, 0x4, 0x7, 0x4c, "16a916829b45c549b9427d5c2024a987478fab606efba1c0e6280382df0ada2d7a00fd313ba5c2f59b37d89b9b3e7758113749b6ab7be04dda0c187720feed", 0x36}, 0x80, &(0x7f0000000300)=[{&(0x7f00000001c0)="6581a2e77d5be3a75604aa6036e02d3dd8da713d9e975b2e87bbf7b2ebaed17d8bf142094a8571b34c4f2a2115b46d6fc46dabb09196d5472cd5c9a5ce2d22690fcedf38c8ebc3e745f3844e4a87c99568d9", 0x52}, {&(0x7f0000000240)="4b23671eb698f5c3639df0957319c9d823b5658317564ca90adfad40a869557ddce2b7e889d97ae8401a49031d2d2786f500e7e6f5cf22ad587616811ecd7e3d2a9b55ef0f6fa237cefbb38700c15b158d4f5185c42c6f03c03545676718306b1a14d96499772dc78f4781230ce403760109b1a0ffd54501746599cb3b0f2785ffc91c3f193332cb380786c354db22068fa92d101b", 0x95}, {&(0x7f00000003c0)="a12c76f3b953bd948e411fbb80c90d92a56f329ad36600d26aba32d0262e089764b13a7c52abe54dd0184d73570867dc314c7408691c3fbe0225f382a77a329e002b2e146c0c862870130ae829d6ed2f0d88835e62fe5e7ead45ae55a9157477ea0008fd858c70761982ba86d5f07b8f0542f4e81f464bc225cba609b69a584776a00712e02d2c65ea7e5a6619f78893d14be6f9f92e9e809b3b269a7322b371ca95d4126c2bc78c48da461ef82307008ab2621621cf2dd85982d751beb04f77547ee2cc5bff94030745556d07a5f037728cc910d10026cc85139c45ac130fb7080091a8d64541c065", 0xe9}], 0x3, &(0x7f00000004c0)=[{0x30, 0x117, 0x0, "edf773a7ea54a95a0695604cb432170529aaf736d320e0b43db4d85fd3"}, {0x1010, 0x108, 0x5, "c6765c9ab17d7c826daf807b8968ac65b7895ac1c3e15745bcccb90e5a7f0ceabc3b26a1836a1971f9a7e8e81dde53cd393fa28725a4563cd3ecf457c336ef644f0c76275ade6334d96ef995fa84da8b503c668aa06c0acb59c1d8be3136275cbc431acf5a5de4e31e5452620069850619f42cf955e977b2d79ecaa9903a0c3c01400f54a4aabf3456e368fc6418f1e09333a4a2f1a4f4b250301f39a3466e8fc91f1a3b55606479fcc1a08deab374b315441355e624d8b8b96dc86dc3534ffa1720cc7279267e03ae3dfc261e27fb4fd25103aed6fecb37c04d86eb08bdf2b25df155237d2cb871e973dc07e2492222a40e8d9621a8c9bf6657af6f23a6d7e115f9a51cf1903ebc9a010c387c210164c8489a697fb5f37e8c1f508051cf6a20cb515596d1eb66560ed80cd2418c4a45f242fe7b7ca670a81a27b804419ac8f5fab0325bdbe338e57df2a77521d0c895d482a6498e5bb0cdee0b3f20c4021c3f3d8ab8b83585badae3a7342fc7991358a8304c84eb9a1ce60811d6fadd3208863148089805dc11e8c6e186f4807e691ac4849f725202296c7904391111d88fdbe19c312a2e621a0d350ab6f5291fd573d1be073a82a1238a45a3ca572842fbea531c57f382128ac23614d3e2644be72045fe19c6a018a71a3fd5d86f49d298c6e5a66470da9d8a1411076b7e0e10bd7c64c00877f2ab0412f3c1c59bb732c076a187dae995b6acd105bcc4b71513de4a6edf09761d175dc4cf3747b84b8cd80a6459f070aec175581e8258eac5abb645f4cf01021017398443064cb3bc9536a54b87a34b2fafbd76d2c41fefd7627a7c33ae88922f7c69608d1cf79bb0f6518f0b301d58c70add1e7d6f87c8887067d4c8984c7c998cca76a69cb58eafd383cf93cfd2d0ee050b158ef1f9f4d8310041c5d4cf2e3d5c18e5d4ba384a2a70e2b9263aacf951b53602db73993396ec64e0184727d197382e74ce0dc8e82b507b92b7ec8d6297668441df9705cbc1ad4814de7f15addcf9c4616001bd641c7188e8615452bd715f4cfdfda7d13c873ab32cf98a485514ce50da4431400ec47d9f879b7ffc5ed8572501d3944eaf4f2ce5d5bbb4ddc00d6d6f663fce29880b640ef56a3a52839d9c1a0c01cb5d66e047dbab5b6807c76f7af836a6a46d61a7b75d14374af27e2fc98823f7200d2efcdfb8dbb3d91dc5f4f96f24ce81344395af439075d8cb7a236e380361995473bcb15a19d7a6999c0eba896a3ecdefd898f39032251d2e1d6800e3d94fb26ff61bfa187511924a4e765fad253d47f53b8ea126faf1f830aa12764196d87b30591bf205b63ccd843a540283250e1a935e35b22ca16ad1ff5c575113111b033d90813ea924c3037079fcb34d8d53b591e3fec9337a5ce7181a89eee18b42e7f53ee2868c4c6d00c7a4c09accc60136b9e314171694c92bb477b72fdc85e5fb266a2d9af07145a3b97e00fce26aa49eec77f14a1639f213a85fd39830a57a13b08ed3f28453f38301f29b44b659e2da3aa638790dc151bfd8e265f98e093d11227c726534c2d440c1e52a34db7ce4bcbbc560bd5659628ec2b27ca0cb74e19238495774f9b2707f4fe9928032073aa952a0ff95bcbf73c817475e8313a7ec97b8b5844f39850227203f35a28427df9b652c8c519f64fdb5dd7afd34d580ea5c37cd9d091d5aa97a8a5f267bd6ceb2cf17e0506d8111e759264b453221009495e31cce9d86f439b64d99e922c7b9aed092ec63050d3cf395d35f7e07c9db7f4daa6a14ff0bf94e2c165676a2d3b6457b321faec53fb2871af9185af69da73a9b6a4fd078f72edbf0fd4bb0e5a4ab93ade351bba92da75ed30551e5853dc101aa69ae24395ff4b807c0845998f991a63877ccff5cdbe5a845407252e841b401b316c2e0eba5074b9a15edb1b6d4d23a7e20e7f911edcf41d19e993c4f35ae11336b0bf14693110e3f4ed020eb070a420a1a43ad656a63ecc203ec85ac8d34d2970f32e7db4017287a8f86c156bab94c59f95f6ce16470cff5a65008bdc57c47edca620b442d533d1b7ad2746c58a3021e9fcc7de199933275f4aecd5f7f38670743d492aa8758b780f63406cf9c60cd846e7c0f5fd0ac1268d3b699ccfb176c1ec7ade77c7a1fcf3de44abe2c2c06237588380b3afafdf17ed728ccb839ab3276d54d12b47c7b800c554e1bdd1cabc1cef9a002fc1a62ffdb4c549cc3f7bfafd13d659064cdf0abcf4d020532129176938d687858b3bcdcd12249723b233c789c765a528ba949e570ea010d1faf43ebba972ad9f6806e320011cd1d8d3cb9ce61e84e82e9833373fb4f9e951fb9d94cfdaa5c55077f8524b69f21685090811df298ee3632b95de6edb59f303c066f0e0d3e48abf59c92d7015df5805060f8cb6fd56bc5a0a439b091dad084e33aaa3803b22b20629e90e1ffcef67240e139363a67f64176930a13815e862e0066b9e1baa843694e6afa20cec854b8197788f78639f2cb49e4d2d333a709581ef3dbb2d24a53ff87e078d4adb8e27e93ad17625a4325422994a4787cddfda4a286eb7b495625ba94c563d5a7579a803cdeb141a4ebc83d89f053184d743677647da69041bea16a9da1c0857e2ecc09ce0e92de21fda167835201e8f22798ec46f169b8abbb241f923e3063df8945f7aac6e9df560a67a3d1255b5e304bc1b2c139cf67b1b2a3f7af91e107794c3524d3e0bb83b6accf96b5fc388ce53bf9ba61e137b995bf984a121762a32760088772f1082324cf1f3451fde82cedef0eab54239a76eb56ce7cb270e50a4f2b1720b9924bdda40ea471b374adcf30cfeee2794a2344517e155babda80cc166ee433bc343951f0ec901faa669274b0558aaa73d3c3e2f0e6a6d42fb9b4c77983b0c61d9a3bc97d3556982cda1d934f7f2c4fd637af350127c006dcbcc7196c2aab5d23daeef3bf1de8d041ec7de4cbdb5d691d9cac35af21fa270e3603bcec030d03737ce9c458eea51de4bd70fe6ac8ecf936d53107675909db61814480bf1bf45025f224df8ef8ced99b0dbf3db82ea422145588b8d9f60c63bd332436ab85e885aa81e8a0a5174208c59f3cb0547b51673665574e101e24284971d90aae2fae35dd9e5ad430ef1124f35bfdd28e286d2736b6ddc2ba4fa915b4bf2fe83dba0c9ce70ef1fb5f3ad9b800e6e3e15aeec136d993de49880164acf13999646f52373f73fb6816dd40b5471409c16d81b69e203a2b43478f389885bb3c3d94d2a6d5db0b6b9e32b75bab4678686a45a24a079401c8d33e7ba855b837bcbc1c6145f26c30106dea9df868369ae6cf4978f359abc4dcbba89b0287363b3c0d4cad209477e1a694326fa2ec430ce1093663f55b2cf74e2fbc0facee2cfd5c911eb64c4680a64d378c4a8c9c327005f9c05ebdbf96d7116d6d35b4b3629effe3669453afe101c5962da3a1349654114c72abe2fc4d0251122a5e4681e0a98525bbdf20852075c943784cb185a77a4b59cb32471bf42746560590540fa36224bfdd5bd32018ed209633cd22f37a3b101e6034ff6dced5b775a3ae03318849e2ed5d2e8f129516951794f5589719a92ac67e9f690c9920aab4fed5768bc75f76ace9ce893d1112434e6816ae6ce982a4682b83e0512afea5e2898986d85eb75e73b971ba6ac0264ca5784c201a082ce58cecec4f286cb75454bf68b25314111ab2e6b75c2715e0fd2dac952b21329cceb0bea138cb074aa488841815771cfdc0a983b914bc79c63217acf166451b061bf0e09de39b1db8558339b40b9378ee371f66eb091ae271c5042c8a1e84f54f1be3af41f2bdcc7dadfb464e9ec942cc58cd3975b8e56fc9ec166a190463669d1a848f83cc19bcf5a7d1aad2568de729becc19e6269840e64b25e5fe5e2eaab12261780bfff6356d76d86f29d986b1ae6047cae51c841750be581abaf10bf728869341d880f649fa6de428b31980e18a823474ad4e9eea387b7fe4ede79a7e225c493b123bb174c8ef0509b7bfc421a9b28ca6e5907c3939efa141c4623ed9449b3fcda732f0445404962e79b0cc0b41c549fc3f238e9b67206a32ff1df9681dd288349c557d62412345bde42db1dd6eda6282647713d672e8d740e0c45cf08567064bcec0a8be419a709354461f7cd7c33751268f50cb2d263f21311c412d5ebe80975a45b5dfbf2c6ea02f1254c0315d6890cfd56a9e7211e06ae93ae2d523d68e312fd1e5dcbef8a82517073061c32f383bdbca4dc0092d341b376e88feed227f2ad7a6bd705254b85b99b2c0cca99588f6cbbae0f7fa04a37c115e70dac2fbd2f2ace16a876962e8b7613bd2b57c4d4172625ea06c123ee531da39c1fb2de44e66bcc842c5308e810f39fd8bfda3e239a40e33549f955e23d32bab3aff31c712c0a5525f52f0ae925044f5eb88bb31f86e5dbac707da6b998b8611ca75350844e8654bbdaf461c1e40a88ae458dfcabc56beda678fa58f8b5b6b51163381d706e663b6a2117c547260c6b922144ef82177053981ce0be713bdb36e4f4c6164b023a04efb081f82e5a8d38531534811a537f3825a95dcedd903cc5144f18ee21b09c89addb443fb96f8806157df96cc5a4746eb4bac0ed5a49a8c5c22377cb310d61e77e705158d66e826cbe677350c886a34f1892e35578043791ea70fe88d44cae989875ea4f54bf11adaa03c32903448ab915033737fcd01bbc5a270cf01ddc43f7c1a9614e3e9b8876720eab9fafe358d5509291056747f6d67a73d1f055a45a40468c1156ece4dacb15ce85f7892f7dd2a6aaf1048c94c4250ec130e4e73d1ee5403c175be934da507f354f86a7df1360335f52ac5010c28420907b52805ce926f4f2f7fab98431b3072bfe60e7eeb76dfefdb001e9636c3059267af8ec6c9a9f67dd6d3a1158c6e807a9111aa61ef472fea63288ab4e4c6cdee4e26d045418d71e49bb922abbe317d2eb3ccf1658081db704f9d1a3b77bcdc51dc479d182808eea98c467f69f9e0abd8fafab40437656f42152b55ae980568f94536b6a3e2afe9d0495ba4f7b055ceded96c501d139f5427fa708460352cfcb0c413c1c2631a906e0e2c1ca4e409eb26659f083cb98f8c3c24c348ff212610660d0c3924d5db4ac55b7dc8b20d312d3451d2a7fc250085fc62c6b8eadfab1d8c1fe3326a3ed947b1d411f9ff2b881405696150c1d62f8ec015005bef6d866702203946d039ba79c86684acd43a09b43fade9efcd1401e60ee48da37ec4ee552fa387f9ce243ed531e08a926eda2caf8e4d99a8fc238371fd57416d2d9c9e38f6b0995593c63b05de307f47cb5d6faa26ce18e226041bf4018a2b447d160f47b1b08ad2d7c83623eceda40f7b0130dff09fd468151e6189bdb474593d1d6830f73a5faad8a5866177629711fd821d36bc4157dbee97640a7fad3634a7c3019abf6dbb885ae6ae7d086bf5077de09683db47916d08084f653c7ce4d1b630402b22a319b0de5b30769152b1293126ec0d889b1a95a359c76578fbb2fe0c2b2bd93d1ddf1771e6af87e3a15812a904ba4c59bfaf187a15d0297b2553dffabaf02b84d56b3f1500524924d5f8e91377d5a651bb1b377b5d8fc3a3d9bdf82b41a2b1f15fb24334711969a823535bf02b754a3e8f1c19f0ab4ea984422954dfb02b19c39d9c0d79ea7786337216d5bad2a3918dee1a1647caca71fa09f58053f39f78b2dbf61eb0b9736b238136c4889946820797be08be4da826feed0b3a463f07c247a02e9a31bf14df5f905689e6ab9ee3c109e5c09a"}, {0xb8, 0x1a, 0x8, "38d0e2f2d841304d8c5e2109dcc21fcca685307e3abce75f23e5a99611f7f9f282fc4ecb97dc19261d581ee844ca738bbda860c1368fe552be52bd77534398aed39faaaf61fa09b2aa6dfd2b113ad7815426b847d6016b106d80727b94a53e38a741f7c303a6179124dda7f8a48c8f6de71ef80a39873bb45ef4400c57a8541f20a16f055d6fd703c406af6935f715cc6fdc3d3b9b48026a22c18658c9f2007d963b287f68c4"}, {0xb0, 0x115, 0x4, "33ce05434039a5b2c634ea50014392d77eb5cabb5ca8df269ccbc432b29f814fb124b48877ef76268f908d2dfc22d906897f7a1572ee9510e0482bbeb5301237a1fd832684e494935b5f7886d525b3a143e6b9a9656e76d99dc438a039700ad3d17d4ef80220f2e1d85e35e940ffaf0c71b50032ae1aad87348cfac7f89bb4ae66dc396c33c7d35385c831c36ea541d623cea6e2df6c4b26a99941"}, {0xf8, 0x110, 0xfa21, "d98e4342775ba398dd59ddb3a1da897acbf9e1ba1d79f828042fc9baaad4bc02281a1ee21f114f1ef6460fd7cef39899d3bc204fd11fad9b3036adf4e2dc789518bddbb624818542f5e7a2c1193a3b9b28f36d25d07636e36f934905ee63025f36f29e0d941ce17c19e78b61cdfeb048dfc5e66b9577e10b5e0d993ed8df00364c1b48a5a20d14e0fec22d0542a981387ba6a71b30dd5f2a408cb132aceec116353b63844d77b856c9167282ad71a642504720bc97c43aad49de2152d0bb75f114a4948b0a9606e73f85288a9fe11d829166fe9c18abfc3f3970614db6cfbdb9dcd7fa"}, {0x50, 0x1, 0x1, "45625198df69e1c46fc56a32ebf12d3846b7bd5d2504fb16c7fa20afe14946d58f3ca5a6f95be9c7a7d9de54c5b800984b709a72c4eb64b76c"}, {0xd0, 0x6f68bd8f98bb920f, 0x1, "00cd9ca6dc8a80d385addc99ce2a8c6becdc6b6af4ef7ccf0f953ae95762df078ad0f03f2fdddcc85b4461f80f428bb6d041662c1566c839398a86246de3955ca6ebc560862b8d271a04559ce9550d0a07f034e4070d047c3e7b35115e458849352d61e8b781e048b029002c4fc7c8014b2b7b233e57595cc8ef700fd61f0bd16a906dd7965353baf8906ec839b797c1a886e31f9e72617f96552804bd1d95ee279196f346afbe1e7dd6b6abb71b2c0e19a56b6d881c92c16f2ecf8042"}], 0x13c0}}, {{&(0x7f0000001880)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0x64010101}}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001900)="f270e7f02d68f9d67864c0fd40a2c222a50a787ca55506cc9fc8d988f8024ced8c9213693527735241f0d87857d871daae448c2ca50f72caab3063b3f2f80343686be1474a9fb24ffc36ea7f0b4fb1578a2bc3e1191332b68b8074a6b521149aeacb0681ca23204a8f5ef13e695341cf429f9884c10aa880987bab1e61142c6addeea6dec31184b627bb9fad7528", 0x8e}], 0x1, &(0x7f0000001a00)=[{0x38, 0x113, 0x2, "3e98ccc2458a0364293f99a1f4b48d3ccb5b3876fd3a226a075d2e7b6cb334d0d4df1b"}, {0x68, 0x102, 0x1f, "6ddda4ef67dd9d1ecb3a43da3b9653c49f1d3f04bcee619c6589c04d879d657bbd01fbe0012d3056f8c2ae4d735c13fbdedf5e3c215756e2f51c7f97081871022a6209fafb964a6862fb94c2f3036c7e4b0082"}], 0xa0}}], 0x2, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14, 0x16, 0x20, 0x70bd28, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4800}, 0x4000) 23:20:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab002febc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0xfffffffffffffffe, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r2, r0, 0x0, 0x8000200000004) 23:20:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35002dd169708a1caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f166d33d2cd92987634e78adac4e36886fb800cf49f61039b72311cc01754af37fcca92119ce409983ce2a23c00f90761dc25c59538fd55df9c982f7215414e1ce4f02eaee68ec1211ec28fc4de2ce9c32dbd2627768bfc71"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x11, r5, 0x74bac000) 23:20:54 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x9, 0x9, 0x0, 0x3}, 0x0) sched_setattr(r3, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x4924924924927be, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) clock_gettime(0x0, &(0x7f0000006f80)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000006e40)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000500)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/172, 0xac}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f00000015c0)=""/213, 0xd5}, {&(0x7f00000016c0)=""/180, 0xb4}, {&(0x7f0000001780)=""/4096, 0x1000}], 0x6}}, {{&(0x7f0000002780)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000002800)=""/4096, 0x1000}], 0x1, &(0x7f0000003800)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f0000003900)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000003a00)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}}], 0x3, 0x2000, &(0x7f0000006fc0)={r6, r7+60000000}) sched_setattr(0x0, &(0x7f0000003b40)={0x38, 0x0, 0xb, 0x3, 0x927, 0x1ff, 0x7ff, 0x4, 0x1, 0xff}, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) umount2(&(0x7f0000000380)='./file0\x00', 0x3) 23:20:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r2, r0, 0x0, 0x8000200000004) r3 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r3, 0x4018f50b, &(0x7f00000000c0)={0x0, 0x100000001, 0x80000001}) 23:20:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x40000, 0x42) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYRES32=r2, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f167933"]) fstat(r3, &(0x7f0000000140)) readahead(r2, 0x8, 0x5) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="a1247624bf9a11e1f698a58a7ec79bc21bf551e35254967eb78993f08d28a0d1157be5f0238bc6b40c8e12802d6b6a3523aece45d9f3c957ae26855039c0ad9c1821c5c31024531456f2c538417516c0f8b59cba06206636e140ca431a73e9c3a95435782a7cac38b73980ac3a90d8848321440705506aa2d630d35b3b782dcbca96971aa3b8abe9c96659071228e1f2d7930450ccf7efe24e36e4d6656c727b4bd063c5ad37bd1879a3f6fdf72196dde6303f12f3c80dcc7f05a3460e105948906050a72c7c6ca9342a25e2463365f65158490335e2468c221eee9b1b172cc93f2cbbb0fe2a51cc851d35a53b86cc58b225383b7faf293d95bb5138a81ca50447e14c0fa12bfccb28cfca5460eede30ecbd0b704ad52b3ac8081690958cc4bc635969bdfdddbe7e3bb93f80767f6f38dd89119f0a4be77b0fff07eb6e589b75f1363e8c34e6"], 0xb0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000040)={0x28}, 0x28) r4 = getpid() sched_setattr(r4, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x6b, 0x5, 0x76, 0x40, 0x0, 0x10001, 0x6004, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000380), 0x9}, 0x9044, 0x5, 0x400, 0xd93ef173428af569, 0x6, 0xfff, 0x8, 0x0, 0x9, 0x0, 0x5}, r4, 0x7, 0xffffffffffffffff, 0xa) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000440)={0x50, 0x0, 0x0, {0x7, 0x22, 0x0, 0x0, 0x2, 0x10}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, '\x00'}}, 0x22) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 23:20:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35002dd169708a1caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f166d33d2cd92987634e78adac4e36886fb800cf49f61039b72311cc01754af37fcca92119ce409983ce2a23c00f90761dc25c59538fd55df9c982f7215414e1ce4f02eaee68ec1211ec28fc4de2ce9c32dbd2627768bfc71"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:20:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x800000000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000300)='cgroup.events\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f00000002c0)=@usbdevfs_connect={0x1}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0xd, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x7}, [@jmp={0x5, 0x0, 0x9, 0x0, 0x0, 0x40, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0x3, 0x9, 0x9, 0xffffffffffffffc0, 0xfffffffffffffffc}, @alu={0x4, 0x1, 0x6, 0x2, 0x6, 0xfffffffffffffff4, 0xfffffffffffffffc}, @generic={0x6, 0xc, 0x9, 0x126, 0x1}, @alu={0x4, 0x1, 0xc, 0xb, 0xb, 0xfffffffffffffff0, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0x1, 0x5, 0x5, 0xfffffffffffffffc, 0x8}, @jmp={0x5, 0x0, 0x3, 0x1, 0x4, 0x100, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0xa4}, @exit, @ldst={0x1, 0x1, 0x0, 0x0, 0x5, 0xfffffffffffffff8, 0xfffffffffffffffc}]}, &(0x7f00000000c0)='GPL\x00', 0x7ff, 0x17, &(0x7f0000000100)=""/23, 0x40f00, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x4, 0x8}, 0x10}, 0x78) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYRES32=r4, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f167933"]) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r5, 0x40089413, &(0x7f0000000000)=0x8335) fcntl$getflags(r1, 0x1) 23:20:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a9f3d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:55 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x4000000000000, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:20:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:20:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xfffffffffffffff7, 0x12) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) signalfd(r1, &(0x7f00000000c0)={[0x1]}, 0x8) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) sendfile(r1, r2, 0x0, 0x5) 23:20:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x40000, 0x42) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYRES32=r2, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f167933"]) fstat(r3, &(0x7f0000000140)) readahead(r2, 0x8, 0x5) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0xb0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000040)={0x28}, 0x28) r4 = getpid() sched_setattr(r4, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x6b, 0x5, 0x76, 0x40, 0x0, 0x10001, 0x6004, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000380), 0x9}, 0x9044, 0x5, 0x400, 0xd93ef173428af569, 0x6, 0xfff, 0x8, 0x0, 0x9, 0x0, 0x5}, r4, 0x7, 0xffffffffffffffff, 0xa) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000440)={0x50, 0x0, 0x0, {0x7, 0x22, 0x0, 0x0, 0x2, 0x10}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, '\x00'}}, 0x22) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 23:20:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da04dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$BTRFS_IOC_SNAP_CREATE(r1, 0x50009401, &(0x7f0000000240)={{r0}, "02bb164c74723a2f117e52610a04264233c58d7f6cdd8c27893f81f92844a6f060f26a25323d55860a2fcfb8a7ecb87f5300871c20b2855acd8baac142347818a45ef7f92f07613eb597056a93e3cb351d5e50eff87015531fbb896ef0b3ffbed13a755e7739cc3394d34ca8deeeb1675af9278ccd814f70b0f00384872b6a140b09e47ec9ffdfbe3ab7de63de6058990119db613dc4d982225aea18857c8449d2710f94c13a9a5592c9f7bc7fd910054d1b1cce8fd7e992aee85fe5905673bda5020e47e9ca4238f6ac10280183cb3804fc8d80f70790c08f7765a219d5755c789f12e4019b979cbf2db7e3ab5ce84bd248e832408eeb951e9bf21c9a58c06f06449e7ec48e7f7608980434d691d3199adefd0bc1ed5a6035c2caeb222fbcf9dd569a049ed348b242702443c3ccf61ce5b6df0676bd761d7891f238f6d50460640c1d6014ff74cf127e2ca6eeba1869f9701615b72bf536f74e9ee6686a81c7e5c0b2cc696ffe6ef0b87026bd4ea95201cedb2cf270ab6bc25b797dbf02aeeae4f72d30542fd9d2cc23d6093feb9f7792bc19301c858b2adb635163ddab489870d35078a2a2b065b984fd3d3349af16292642bfe3086fff969d5e8177b896577facb3d12f95efc3302565e99ef2ddd9ac487d9fea27ef63e61f5684f620565de94a23ba790b91970b35f7098edbb639eca2b2e4c0ac6a6d0cc79026113ad93b7eb13f27770ebf49af96240c79f4711f74d01288ff5f5171f41108d3735b1f78e9454fc985bb020991ecdd20e2e6c9ecd6e677bb444627bd6c35ca2880b6e97a2dd6a9deca0961e057978684dd8a519675738840c3895a5361cce51d77c6d11a250fbd8a88f15b06b44aafa8ea8fadb48d733f1eaaf69688ae71b2996a633f09446bf40e6947f7b69b9114216a778101eb6c144ee2d989a75e76e4183db70343d68ab648387dc340c2e1cde446a8e166f6c1c348e8b8f6d02043f3eef0320881519f85baf8b03b04d3e3453d702820f051a73981527e05a0b434a9ed140907e9e391c7469ec9e6291ac48234e44fba5777c4ab617f538db4f2f64d7c85122589abfb36731f5b01fd37038410ff213f26569b80cefe61a06e310f7cb562edb216228318fc534298471d043909573e94237476c647d1167b9280f68ff7f65743428ce9ca7957dce3e6ea231975856901bbc21608ea6db69e807b4ab420dc9efa58da14f24dce430063eb6600bcae4bdf6cf9231b7e77e25291c97f35d1d7a7888a0b2777ddf2f2a8d9f9d2b47565618024c024716acbe06570488eca0bf66fd7e60d08cc284d57a99c258a1dd3d25621fdb4ec9f6d732db3bb8f61c7364fc76fc627a98e2cb8e726e6889169b03d9a84094f2dcb772ba41bfd604d61053f1e1304e77ed78db02b51d2c38a3de8d8b38199a5fcc2e3cc2af4c18c6b2860e02de72a2bc73d4e0430b94738f03381c535294eafeebb197b8f5a989b9685fbc99679bfd30a6caf64ee24d19396f81aa740c65e5f9f23022343a57f6773893029ad9c7e6e9731405263ad87c778ff1dd3ac9130e43ecd8a25c249efae7b4a2aaf5ea4806d023d80f92cff4d179f562d154ebd6e29ed9df1ad1fb4f474f3397418cec3c8b149eda0397aece37da6a018b8a1945f7082e3bc2419af150ec3fb352c4fdbaefa6a033c742dc1bc07ce12a79548064d59964890b2a7aa0b680aa79599a371470c7176275fcf3468053e0ab2c5fc7cfc3a66c838234e70d5583b2ad4147ca4c974443b35bf225ab78e746ecc7cc120fe71fcccba673ad3af49a8a27ba0dcf757235b45fa60906bb7a25a506f08c194deecee102506fa00da8a2bde24b3ceb67aee35a8b3c9b6932e7be1d3f524e986ca660c8cbe2e6a8ed9053c840d24ae29aaf026e6c1cb0a6cbf44eaa86d7fe305144219f9b093e017a07e15f58530f8353c2c1ab2ede527bf81f3328b4a4cef85fb1bedd03be1999b305c9354b91ac765dff241e9f1344567d2f9aefd90b2acf2373f7790beb6b50c6dda0d9e966ffce420483bfc3a98070099392838809f2d0a9ec4035470f212ad3c06bbefee4590a0e0624be417d3b30b967169c756e0790f6a6a27efee0ab160fde83b10e2594e868824b144ba2acb2869a70db08f3595a064ede6af07162492a2455880653b54a72e063e25191111d6f839667b75d1c2d9ab44c3c9b827144cfa186a909f377888bb887a1ac80d2de1896bf3dc1bbf38d706a8baacd357e5b3f47bdce6131437ee6e483e9a3dea7f3c526342255dc1a547cfa6b20ab3ebc0cbf92b6c4a899b670e30dc8067fde04d275090b296bbba5947e52be7342d7c40bf5b17782e54e0c5af5906879d3429066b2fc755aefcfae126c57e15430d34d9c4ce4682df263d4f2a60cf71b7e222643cd3e5da2b7143012cc85f16c621fce2f6af148352e8df44ad77a001834d9cf260c4dc5ce9043d02fec9ce003d913788a88089aadddf25a342c1b358c82968f695dea38853c983edadf70a076e68d3d9e1362ca342dcde11439bcef0222334d7e09a71580016ad42a200c44fced7c1bc1c3f03e1fb15184209e61cbaeb28875b7d5239221c569cb375c22250b23d177d0239c495c8f19863024b4ae3f06cf6b29c4269eaa863d434355f6a15f80177bd2e85fa06bec539b8fc6b2bebac6b4356776e537bdc524b2f45fa1eeca56ef7e027b27b6ed64a8970d4351ad49afde4106e3b3ceb6d523e678f16669246cb9fb8df706c4c62d2aa248b16ec65d60f17a09909b8eef05e0a43636d7ac9214bc23904bae8da5f5b69783e58e31103ac48bc63e9e2a0ce9ed8653fc965703d65e73822bc58311604cca2e1f10bb7f171d69e5aa12f863b908c17db823943177fde74636feb411fc3c5670ef5320642066fd4731a5e6524e20ae9af089f23601535e214e756604745a64e22044ca866a28acd528ea9ca38dc8e28ad740d0ca8f5dae858658e490476a4223b9974660add093fe7aa467425fd8638c8ef31f9ea06908855e19be94fe4b87b623c9d8f2e0a124eb668eb767b8f871364402ef4a4d47f90508fd9e41b13cbd3ebcd7539b5b39bd86a92a5588a968360777defc7a7f2e29804ea1823fe81892cd5d85400cf304bdb0a43b391a92477f2f331c9f618c2cfe39ac47502778bc518733fede1c60298ea89956d7f9619b5b05e693f173f7fec08177b6210f5af6387bf465002a5676b5268ea12062d10e5f26760064fc5254b9b6ca0230ead79e0b778abf3f02639e31b48494917b362c4f1306e0bf8283ee86683889eb14e0326b8614f0a2370fd0796a7f0443f648448a518f004893a9d2b324ddc3886aa5d7fd1e961ccd63511ec70c6fceee1138763511a46a1e2cedeb6ea76144d8951040ec9d496e0541d1fdd7122c6399bfffd265a7c278c6c67f0c62f8db949e78c94d291f981fb191d2c2ffce28ab1f53bb7c640960d1e2777cc319e122e286e4922f985abc260df339da57fda6ed4c087d2b6bf8c3fed4d0247ee7960054a7157e2dd745d1f1d75615c194752ed405155c2ba0b13912c9350bee3c09c050443c91f8a8ae5783dd915238f5b445466cf623316f39d25d896ce441f4bc3d43675d9d834700953c6dd5eddc6e4a4248f146cb7bc4325f274143ce973e8d63024a9731cda0349137f0fa471fb4c5065296d5026696681c7c0478858362a52ff225a4330262a9624a8f6fb103c85d47c63741737755b5322a5e355148550e0b13e0da5d9ef72474c4de3e93eb32a05d57a716b5beebed173ba41695301f158782680e1a64c495fc8d0f20ff1bd18bd368481c41bbd8005078da40ff814886270d4b56bdfda02da0b732805800c184858a24d6bcf5bc174ddbb4be5c426fa60765824a53f4e18fc2acf1c571595a4e24c7cc601def541b58c14c24ae1ed6ad62bd25b652096a5d988cae147eb964d53425d8fda4c7f0207d540e5ccf7bb94455c786451ec60ebccf226a8c719202a8f7666df9950ca28a2d34adfa02ec060a81a27079f32cf2f8313d43a17d5d3fd7e43b0bac228cc386c892abe8e917912c8b2761e1cb4ae29acd2ca66aef4aa9e1465064f6b29238e8b9c736d1c46aca826f88a10edf7efed074613cb1c392fcd992ac9f16f6aca1fe053457622d2a437b3a386c87592134f0ddc972b3e70e9a8e29cb88b05294b653a64520a903a240af5f6bd2edf43eca7e1d2ddc3b5fb69da855052e73dcf31f4497cee4207bc6b822d96e1f4527a9930585532d96bc33649c09a125822cb9acb408896360c1d44235d2b34085ad470efc3b1a631ee79ddd0f488210d122c612db3f7b041ae7889a87b7bb0a7b1d3d22bc468b47383717796021a1cff3707abed2bb93f29efb693802fd9e8bdc276c52847c049ab3bb975134ee86c7cca5a3de2c0b0a725f9fa956f02828779d94db3b2b1aa6340e21eecbe672e82d85232a74b4f856998aace406d734bdadf289f9a2de25179d14ae22b51cdb60cf6c8a93b14e07b5b50b4902105febed33c0d4a6d14336062e9e71d1ff59ddc10d7eedff89516cd232083759a3ca804f7fcbb2b53e189e35a4e1bcdc0f887586ad466549f40c986b632d83a4b498cc35ef7c02d417841975fd780bae67158a7084d4f40386ba313969b2c6cb58fc2e71bf3fe6e15f994107ba627ca36015ae1adf824185476f65055b52a02024041c83e8ceded2f3c392620b5c2ba91d2011ec91c760d95460980b49a38a96bd80c5b3ec23e8620a718fad6973e855a75cdac9fe99cb8b87ab45b82938c29244c3e2144d19d6000176b8b91ee108f47e9b1601161c6594fba87f18f2f389db2321adf93d3c4b31e743e752d30b2cbf8cfe4d92b7330f2c83d002c3019000b43d46cf4bdab2997d8bf28b5b67225878da048ae799665da83d99d5e1ef17a6130e7a713fa2d8b9c08a567e033d2142e13afa1ae546225dfbade7dfc507694c775e6f1116957cc5541a686dd51d26b0708e57355b5cd618b4d22cc860d81aa25f19914df6f7edf638f46473b3ed50c1615972b7a72201c49d3505ee61a0be04cd52cf717108c3c10bf3648d4140ab093dd879193b07c5c1ee178b8276927712e3dbf69e3121b96103dee9c3b591f5e6ef22c721eb3608ed851602faf30e3b482a9b8a101b5fabd0ca87b2c5a8d700d6af918d45f2e57feff8eb30e1bcd40679a38c3646207c334988413233c6512a1af33b54d37decadb70a1492e7d9e1de7454b28a8cc97eeeaf51a10fd49d76cd3751e91bdd9718705667a996fcfdaaf6cbbf78f22cf2852e4188d3584019e010f671f971529ec4d5f33e8572ad079dea1549c87fb7b8d7c02c00d9c2ff7ce9b59c019439cfd08310007692222e12d06638d0d07a34692c318cfa080822e6ff49fc91b8e7525b65e5dd8f8a6136b5bc14aa752bd9c23772e4c702b5d33b93435d9a0455c8462ec76e0db5088bcfe07ec45fcdc6a4bef8b71a99d97220f18ffeae1589f95667130615bcf7ce10132d7868c13fdb5138e11b1cfa3d2e671aa5558adeb84039a4ff9d91212829ecc8110b8730faa3ae113ec1b442d3cc7da2fd08ffaf96d3ae12d7e7ed1cadf8e93d7d69ebc0d8740108cf91d51fc18b9440414dda341bb18d548b633a6a270cf6c80dd6495f7c25db301ab0fe8057ee62501bdeb3fb4a4a9f03431efac33d314271430d69ec29a3977a8fdb1007ea726cd57012ba99924806027eebd6fcafd0dc86011cea79c9485375aa831c9d9c791d7d854538ef02d56b61cddf79e9ba93edea11fea55cfb0c2a170"}) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0xff, 0x81, 0x7f, 0x0, 0x6, 0x10000, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1ff, 0x0, @perf_config_ext={0x6, 0x5}, 0xc8, 0x4, 0x5, 0x5, 0x40, 0x80, 0x9, 0x0, 0x6, 0x0, 0x6}, r1, 0xf, r1, 0x2) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000001240)) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r3, r0, 0x0, 0x8000200000004) 23:20:55 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x9, 0x9, 0x0, 0x3}, 0x0) sched_setattr(r3, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x4924924924927be, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) clock_gettime(0x0, &(0x7f0000006f80)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000006e40)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000500)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/172, 0xac}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f00000015c0)=""/213, 0xd5}, {&(0x7f00000016c0)=""/180, 0xb4}, {&(0x7f0000001780)=""/4096, 0x1000}], 0x6}}, {{&(0x7f0000002780)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000002800)=""/4096, 0x1000}], 0x1, &(0x7f0000003800)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f0000003900)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000003a00)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}}], 0x3, 0x2000, &(0x7f0000006fc0)={r6, r7+60000000}) sched_setattr(0x0, &(0x7f0000003b40)={0x38, 0x0, 0xb, 0x3, 0x927, 0x1ff, 0x7ff, 0x4, 0x1, 0xff}, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) umount2(&(0x7f0000000380)='./file0\x00', 0x3) 23:20:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:20:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da08dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f00000000c0)=0x3, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r2, r0, 0x0, 0x8000200000004) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000300)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) read$FUSE(r5, &(0x7f00000103c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xa0030, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {}, 0x2c, {[], [{@permit_directio}]}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x3, r6}, {0x2, 0x2, r7}, {0x2, 0x1, 0xee00}], {0x4, 0x4}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r8}], {}, {0x20, 0x2}}, 0x54, 0x0) stat(&(0x7f000000b840)='./file0\x00', &(0x7f000000b880)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r3, &(0x7f00000003c0)="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", 0x2000, &(0x7f000000ba00)={&(0x7f0000000180)={0x50, 0x0, 0x200, {0x7, 0x22, 0x1, 0x40000, 0x2000, 0x4c, 0x1, 0xfff}}, &(0x7f0000000100)={0x18, 0x0, 0x200, {0x7}}, &(0x7f0000000200)={0x18, 0x0, 0xc7d0, {0xfffffffffffffffd}}, &(0x7f0000000240)={0x18, 0x0, 0x5, {0x7fd7}}, &(0x7f0000000280)={0x18, 0xfffffffffffffffe, 0x7, {0xffff}}, &(0x7f00000002c0)={0x28, 0xffffffffffffffda, 0x638, {{0x5, 0x5, 0x2}}}, &(0x7f00000023c0)={0x60, 0xfffffffffffffffe, 0x7ab, {{0x75, 0x80000001, 0x15, 0x4, 0x5, 0x20, 0x80, 0xb6}}}, &(0x7f0000000300)={0x18, 0x0, 0x6}, &(0x7f0000002440)={0x1a, 0x0, 0x80000000, {'/dev/fuse\x00'}}, &(0x7f0000002480)={0x20, 0x0, 0x8, {0x0, 0x8}}, &(0x7f0000002540)={0x78, 0x0, 0x6d, {0x0, 0xd9, 0x0, {0x1, 0x0, 0x9, 0x1, 0x5, 0x5, 0x6bf, 0x1ff, 0x6, 0xc000, 0x9, 0x0, 0x0, 0x8}}}, &(0x7f00000025c0)={0x90, 0x7fffffffffffffff, 0x8, {0x1, 0x0, 0x8, 0x1, 0xffff0000, 0x7, {0x5, 0x9, 0x9, 0x5, 0x3, 0x10000, 0x81, 0x80000001, 0x8001, 0x4000, 0x5, 0xee00, 0x0, 0x9, 0x3}}}, &(0x7f0000002680)={0x110, 0xfffffffffffffff5, 0x271, [{0x5, 0x2, 0xe, 0x7, 'memory.events\x00'}, {0x1, 0x10000, 0xa, 0x6, '/dev/fuse\x00'}, {0x2, 0x7fffffff, 0xe, 0x3f, 'memory.events\x00'}, {0x4, 0x3ff, 0x4, 0xd65, '+)&['}, {0x2, 0x7d, 0xe, 0x9, 'memory.events\x00'}, {0x5, 0xff, 0x0, 0x8a5f}, {0x10000, 0x0, 0xa, 0x6, '&-A&)(![)/'}]}, &(0x7f000000b400)={0x410, 0xfffffffffffffffe, 0x0, [{{0x6, 0x3, 0x6, 0xb14, 0xfffffff7, 0x2, {0x3, 0x1ff, 0x3f, 0x80000000, 0xffffffff, 0x3, 0x114b, 0x3, 0x9, 0x1000, 0x4, 0x0, 0xee01, 0x7, 0x2}}, {0x5, 0x0, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x4, 0x3, 0x0, 0x80000001, 0x856f, 0x8, {0x4, 0x9, 0x324, 0xbd, 0x3c, 0x3ff, 0x7, 0x0, 0x10001, 0x6000, 0x20, 0x0, 0xee01, 0xfff, 0x1}}, {0x6, 0x8, 0x9, 0x4, '%%-]:)!.*'}}, {{0x6, 0x2, 0xf6e3, 0x0, 0x9, 0x0, {0x1, 0x4, 0x80000000, 0x400, 0x1000, 0xb0fa, 0xfff, 0x0, 0x40, 0x6000, 0x1, 0x0, 0xffffffffffffffff, 0x7, 0x2b99}}, {0x6, 0xcfac, 0x1c, 0x2, '/proc/sys/net/ipv4/tcp_rmem\x00'}}, {{0x2, 0x0, 0xfffffffffffff800, 0x6, 0x7, 0xd4, {0x0, 0x3, 0xfffffffffffffff8, 0x4, 0x545e, 0x1, 0x8f0, 0x800, 0x6, 0x6000, 0x4, 0x0, 0x0, 0x3, 0x5}}, {0x6, 0x7, 0xa, 0x2, '/dev/fuse\x00'}}, {{0x0, 0x3, 0x200, 0xfffffffffffffff9, 0x2, 0x5, {0x2, 0x1, 0x1, 0xe092, 0x8ad2, 0x8, 0x670b, 0x8001, 0xeb, 0xc000, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x3}}, {0x5, 0x0, 0xa, 0xfffffffa, '/dev/fuse\x00'}}, {{0x4, 0x2, 0x1, 0x5, 0x3f, 0x4, {0x5, 0x101, 0x1, 0x3, 0x3de8, 0x3, 0x81, 0x75d, 0x6e1e40e9, 0x2000, 0x0, r7, 0xee00, 0x3, 0x3}}, {0x2, 0x2, 0xa, 0xffffffff, '/dev/fuse\x00'}}]}, &(0x7f000000b900)={0xa0, 0xfffffffffffffffe, 0x5, {{0x0, 0x2, 0x0, 0x20, 0xbc, 0x0, {0x6, 0x4, 0x80, 0x3, 0x9, 0xfffffffffffff800, 0x0, 0x8, 0x2, 0x6000, 0x122, r9, 0xee01, 0x8, 0x3}}, {0x0, 0x10}}}, &(0x7f000000b9c0)={0x20, 0x0, 0x7, {0x80000001, 0x4, 0x80000001, 0xbb}}}) fallocate(r4, 0x2e, 0xce, 0x53c132ef) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="640000001000010428bd7000fddbdf2500000000", @ANYRES32, @ANYBLOB="41000100000000003c001280090001007866726d000000002c0002800800020001000000080002000000000008000100000000000800020004000000080001000400100008000300", @ANYRES32, @ANYBLOB], 0x64}}, 0x4040880) copy_file_range(r3, 0x0, r4, 0x0, 0x0, 0x0) 23:20:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:20:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000240)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x2) sendfile(r2, r0, 0x0, 0x8000200000004) ioctl$HIDIOCSREPORT(r0, 0x400c4808, &(0x7f0000000000)={0x1, 0x200, 0x1000}) 23:20:56 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x100000000000000, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:20:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:20:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x6000) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./cgroup\x00', 0x1091c0, 0x0) ioctl$USBDEVFS_DROP_PRIVILEGES(r3, 0x4004551e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 23:20:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x23, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000290000000f000000000000000200000002000000008000000080000020000000d3f4655fd3f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39313835313737393300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="0000000000000000000000001990af8004b0449aa6346f3aaa58d0b5010000000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500080000000000000000000000040000007200000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000029000f0003000400"/32, 0x20, 0x1000}, {&(0x7f0000010500)="ff3f0c00fc010000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x1080, 0x2000}, {&(0x7f0000011600)="0b0000000c0001022e00000002000000f40f02022e2e00"/32, 0x20, 0x4000}, {&(0x7f0000011700)="00000000001000"/32, 0x20, 0x5000}, {&(0x7f0000011800)="00000000001000"/32, 0x20, 0x6000}, {&(0x7f0000011900)="00000000001000"/32, 0x20, 0x7000}, {&(0x7f0000011a00)="504d4d00504d4dffd3f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033300075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x8000}, {&(0x7f0000011b00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x9000}, {&(0x7f0000011c00)="0200"/32, 0x20, 0x9400}, {&(0x7f0000011d00)="0300"/32, 0x20, 0x9800}, {&(0x7f0000011e00)="0400"/32, 0x20, 0x9c00}, {&(0x7f0000011f00)="0500"/32, 0x20, 0xa000}, {&(0x7f0000012000)="000000000000000001000000000000000000000081a99a520000000000000000000000000000000008000000000000000000000000000000000000000000000000d000"/96, 0x60, 0xa400}, {&(0x7f0000012100)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0xb000}, {&(0x7f0000012200)="0200"/32, 0x20, 0xb400}, {&(0x7f0000012300)="0300"/32, 0x20, 0xb800}, {&(0x7f0000012400)="0400"/32, 0x20, 0xbc00}, {&(0x7f0000012500)="0500"/32, 0x20, 0xc000}, {&(0x7f0000012600)="000000000000000001000000000000000000000081a99a520000000000000000000000000000000008000000000000000000000000000000000000000000000000d000"/96, 0x60, 0xc400}, {&(0x7f0000012700)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d80f050766696c653100"/64, 0x40, 0xd000}, {&(0x7f0000012800)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff000002ea0100000001000000270f240c000000000000000000000000000000000601f80f0000000006000000779b539778617474723100000601f00f00000000060000007498539778617474723200"/4192, 0x1060, 0x12000}, {&(0x7f0000013900)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xattr2\x00\x00xattr1\x00\x00', 0x20, 0x13fe0}, {&(0x7f0000013a00)="0000000000000000d3f4655fd3f4655fd3f4655f00"/32, 0x20, 0x22000}, {&(0x7f0000013b00)="ed41000000100000d3f4655fd3f4655fd3f4655f00000000000004000800000000000800050000000af301000400000000000000000000000100000003000000", 0x40, 0x22080}, {&(0x7f0000013c00)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001001000000010000800000000000af301000400000000000000000000000200000009000000", 0x40, 0x22100}, {&(0x7f0000013d00)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001001000000010000800000000000af30100040000000000000000000000020000000b000000", 0x40, 0x22180}, {&(0x7f0000013e00)="c041000000400000d3f4655fd3f4655fd3f4655f00000000000002002000000000000800000000000af301000400000000000000000000000400000004000000", 0x40, 0x22500}, {&(0x7f0000013f00)="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"/768, 0x300, 0x22580}, {&(0x7f0000014200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x23000}, {&(0x7f0000014700)='syzkallers\x00'/32, 0x20, 0x24000}, {&(0x7f0000014800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x28000}], 0x0, &(0x7f0000014900)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)=""/4096, 0x1000) 23:20:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da0add1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:56 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() setpgid(0xffffffffffffffff, r1) r2 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x7, 0x5, 0x3, 0x8, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x80, 0x9}, 0x2004, 0x4, 0x0, 0x9, 0x5, 0x8, 0x3e, 0x0, 0x800, 0x0, 0x9}, 0x0, 0x9, r0, 0x1) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000000)=[{r0}, {r2, 0x24}], 0x2, 0x2) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000440)={r3, 0x4, 0x0, 0xfffffffffffffffd}) syz_open_procfs(r1, &(0x7f0000000580)='attr/prev\x00') perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xd8, 0xef, 0x3, 0x0, 0x0, 0x81, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x1, 0x101}, 0x10002, 0x7c36, 0x545, 0x3, 0x100000000, 0x4c00, 0x5, 0x0, 0x7, 0x0, 0x7ff}, r1, 0x8, r3, 0x8) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r5 = socket(0x11, 0x800000003, 0x8) bind(r5, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a0dffc2c654"}, 0x80) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000540)=[{0x6, 0x92, 0x0, 0xe6}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, &(0x7f00000001c0)="44639d4911f72a5e472ed931c7de8d77fefb633ab176fdf6362ef1c33b0d3c5ae3e7a294ab6f35bb11414a6e39a80bac85e07a5c6843bbd99bbaf10e480009", 0x3f, 0x0, &(0x7f00000003c0)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) r6 = accept(r4, &(0x7f0000000300)=@hci, &(0x7f0000000380)=0x80) sendto$inet(r6, &(0x7f00000004c0)="4532a6e8d33c00e74689f5160b187f08867c109b13bc4e00a9c8c997370fa5b4b6de1e69f70e68c78c592c4a9c84aeb0d5f20a63b3cbcdf1777ad1bedf4204226be8fe74a32e60f95a8f755d66ee7d6bc365d554011f5ef1c5b81ad4bbb296045d85c7b921f596fac246f6aba202", 0x6e, 0x20000000, &(0x7f0000000400)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b48376f922b3f1e0b02bd60da03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 23:20:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b408000000000000711175000000000085100000020000008500ca34e8c200000000009500001200"], &(0x7f0000000080)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/190, 0xbe}], 0x1, &(0x7f0000000200)=""/255, 0xff}, 0x40000003) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)=@ipv6_deladdrlabel={0x78, 0x49, 0x100, 0x70bd27, 0x25dfdbfe, {0xa, 0x0, 0x0, 0x0, r4, 0x5}, [@IFAL_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}, @IFAL_LABEL={0x8, 0x2, 0xe}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @remote}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40010}, 0x44) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000082280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800000014002101002000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e0"], 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x5, 0x9, 0x4, 0x100, 0xfffffffffffffff0}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3ff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x8, 0x8}, @jmp={0x5, 0x1, 0x0, 0x0, 0x7d5b878f5340c501, 0x9d, 0xffffffffffffffff}, @ldst={0x1, 0x0, 0x1, 0x7, 0x0, 0x18, 0x10}, @jmp={0x5, 0x1, 0xa, 0x8, 0x3, 0x0, 0xffffffffffffffe1}, @exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}], &(0x7f00000004c0)='GPL\x00', 0x0, 0x76, &(0x7f0000000500)=""/118, 0x41000, 0x1, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x5, 0xa, 0x0, 0x7f}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='io.stat\x00', 0x0, 0x0) 23:20:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0x40106726, 0x20000000) 23:20:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) unlink(&(0x7f0000019480)='./file0\x00') ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000240)={0x1, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000100), 0x0, 0x3ff, 0x0) dup2(r1, r0) 23:20:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da10dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:56 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x3, 0x5, 0x0, 0x200, 0x0, 0x8, 0x8000}, 0x1c) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000055c0)=[{{&(0x7f0000000180)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000340)="b41b1965854a378f4799f8d4a98c96b9d26412e6567e4b42d85f8b01685ef5b848627ad8eef8e17c781c1e5bca379288e968696396a5af9d3f61fb8c73bf663a5e5d003ab5990f4a6bb72708b96d0782c82a242db7c2c719e18fcdbc05270cda73eeb3bb59931b1f3e882e6a8b9ce66a7e2123674b2cee63ef276b7e1421a7b60b3876df0e24a3d01c0d5a515c2e20284b8e1925165d67669088757652fea0525de7f1a23c403ec30eaa52573aa6c145f067944695e05ba391beb3363ffa2c4199d06466914589be77a9fb70319d89bd247477f418b378a4745de6f3d6c8", 0xde}, {&(0x7f0000000440)="e5b0954b4b3ee9b5457c917fb6fe4438b4c9bc2bd60d39663c3a910539f0f3c72acc810f9b85a41e74b63a5d90381770f70012edb279a81e54bb2138ff4e90b650f2bc7e502e17b9b3f4a048729c69c104798962a74bb7623c8c2c4f7e268277ced6c159", 0x64}, {&(0x7f0000000080)="2bf43560b2a44ea2a1ba14196b8526398f38335505996178c47a9f47cab4b2fda46bc182", 0x24}, {&(0x7f00000004c0)="51530a8f486abf4716f1221362744e17a14aed355130035e6c6c8b4ee6f5110f2ee20cb7506588309633de66d051bbb22bcbe6b39c3d60def918ea6b2b28bc1b359e3bb74a5e7de9261cd3d8fb8951c2b8933d8d32849fb0c6", 0x59}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f0000000580)='V', 0x1}, {&(0x7f00000005c0)="c59b454f98926118c280491e97027af2f8d351b4129504d39c9d28f15d0e5522eeb02862ecaf196f52db7ed4a7f2b7aba6632c6dc8b3014e0388b3d3daadbbeaac308b4187615782864c71f3e1039adbd1e7a2deee34c01a0a5beba0d623e22f9aeb4cfe24d6e41e531315118f8d3cc11a023c59380c7eabe977b275", 0x7c}, {&(0x7f0000000640)="0a40c2872f201ea10dd118e38af4e96465652304f7169dd8fa9e9cbec3325e4c19cd3ff45394e84df75aa11ddd2b3342691da4ddd40e7ad1b6e4c53e2f0315962ce7748afb3415085a4cd5c596ed72fa1938019e27a4a6260a47213e76c07b12cbc5de250bad5bdcdb6a4bd41c141ab5a43873955f8b515a9b1b7133b843e7a09266ea", 0x83}, {&(0x7f0000000700)="61c20f07a8e1759303b4d719372055d2c8f85d4cb374b4f667d9b30a22b049eb0f1df912c9af3bde5c234fe0334bdacb0f81c8b4095e8ba10072e2ae593c6836262985b811d1afea45baab991668817742ffabfbd28d", 0x56}, {&(0x7f0000000780)="3593cc4e693da833e087814c39fe6ee7a7ae0a88e85e44b8cb06aea14b19b059c4703ece46e1093ed7d3ecb76ac7752ab1d203c60c9a71db3a7a47cc586a98f784a8d7271f4588bab4750e291bb08e03a980792ab7d3bc084a74f6d9b4686a526638328aeb82b49ae6189d3055e5cb5fe4ecd5870e5188739856bbbe933f6069b149143b7ad602d94cfbee4c664d8635af746c80559298d49b631f06cc0e4f8bd3eaa3168e0cc2794bbf741d1eb5515422f93e90d7eacfb0c91ee90318ab48869b", 0xc1}], 0xa, &(0x7f0000000940)=[{0xa8, 0x117, 0x7, "389c3695669d00506743c22a37da25ebe2295ea683a7458a73842a9670ffa9b48e113a53732abd8c6128d0132841d1c27f46df660014d85bc22c45f124fe3bb32d661e037cd3ac077d25aa3d970cc409965f32ebd50e5e271ee22c76f20b68046ad36a3c0f950a8ddb5c9f8a447430155d038e0794fcc85dc0c6b9bf3a6d32d256907a060e7a49d5bed0f9c9f2d37032436cc529"}], 0xa8}}, {{&(0x7f0000000a00)=@ll={0x11, 0xf8, 0x0, 0x1, 0x5, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001ac0)="6f2980696e9e498729c4ce166c18339073dbd4ea98ad0f98acd24e7db461d3e97ae5ccf5053ce3f74291f4f18e80eb", 0x2f}, {&(0x7f0000001b00)="2f3085b34d22cbe780096ec88c0bffd70b15f4ae99051d42a0d454a2990cafbb2a161ad376db1e36465917c24243c17adbbab217de3f5190ca2456bebd31d501e0a6e4b8e3d9589f3b1b7927f5aad4edcc940a0946a62bf6a8dcb7673538c90c35a775a1f9e78cd7eebd4f1667ee8bf0a61a47d4e51bf42f13eacaab0db7e49026dc2740b817f27e4ab3c410d27235be9045ec2e", 0x94}], 0x2, &(0x7f0000001c00)=[{0x1010, 0x101, 0x9, "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"}, {0x100, 0x11, 0x6, "9353ea0670c45eeedb5efc46cc1a928b541ed733851801ba00c6fdbc31da225757a9d569352fde33a87d2dd8fa4300c3500c85b10556295051c1075f956d846bb24e6d47de60e0bfc0dc5a77deafc01d06880a9ec0a13e1e59619ed03a1ee348cf96e8601b008c42574c378d04c1ec675755f83a05e0982ad9e7c4d17ecd73a1b52f56fb1afd44a1d9097c4ef684682e0df4e82811f96d650f427fc08bed3ff7c08d44d8f08203b36a3a93e61f7de24b7736b36cf2ab0971e45210cb5ff1584db7acf260c584eda764a3dea2efac0fbe4a59c0490c3a4a52742b80412b93583127fba86ed99e86d84e5b"}, {0x80, 0x88, 0x1000, "2bae2474b8eacfc283e14344d2e222ea73ed20d03cb440fef80e620b538ec6d91cc2847c9884187efb323cc1dbe91aefac7c982a0c6e29239149bf7057af058c508d1934919c2473ad9a42d612c5735abff1767cf54d6e240e412ebd16de5a0d5ee8e626e8d124bc29a8c0da97"}, {0x30, 0x107, 0xfff, "28c9da0a04990c8bbceb7d2a0521f6b6cbaafce185a56dcf5b0a"}, {0x70, 0x0, 0x3ff, "a0a3051d19ee1fbfe8eb5c15531a946317ce208d4eddaa1bdd68715a20b3d3ffbac021f35d1262b209cb26746aa68f17866affd97f94c0f234792864138dba0a2914b033c7a071e376d33a2105a1061310525131faca4a92429911fe"}, {0x38, 0x11, 0x9, "5968e6752e02d237eb51f1ff220977d59e2db1ca56132b57bff6f1dfc7596e3f99881c6c57474a24"}, {0x68, 0x11, 0x7, "e6b25a5a5016049e05255a6bbdb0371a3e0ad7148bd6dec9a28cc1f7f763b6813008e0e0c20f15b2f21c05b9b909a4b500b9732543945d2ed9dc522eb6b35235629d3514c350845df8b93eac173964b72f"}, {0x78, 0x108, 0x1000, "752ef077a5dbfd3d5e10d072297dcc38fa1be3cdd90b2548f38a1db79138eec5b59e5aac31267ab2c5c98c5bacf62b4cf24d25b44979b90702062b5503d169fe4a3c7ea6f33576228a754362582f9313a662a7b72fce7fd75ffb4c1a720615568f13dd1e39c2"}], 0x1348}}, {{0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000002f80)="87adf20fd13cfaac4a868cdf2f1216376eab42ef99f3b8593fc3e5afc597b0d6dfa687ad55788dd9c089a16deca0cc313b313b84ef81c51c749d7e43f293cffa77dc5626e02a8ac0f1281d82f756ef64b227c8976bd5abd229d99a986c1a229b85aeab6be58387bde448ded8d171210580e2ded67b8e214d84d1f22076d01e0a", 0x80}, {&(0x7f0000003000)="db324b7c42d1c659a60d0ff5b5a8bfcafda5529949cba26103c9be3ee3c6998c9657ebabe6c414000b7e8ccee750848b2a21e142cb9efec84ef1b465b4e681ee83", 0x41}, {&(0x7f0000003080)="39694ba195da8fa3975f4602b609deca50b96b706fd3ac030d", 0x19}, {&(0x7f00000030c0)="385a545ceef1e2263f149cbe016db4cf3718c47c95d6efb76b34744f66afd51ee4771d61bbc9559f7291e192b6548768b230c4990c0efc8f5805a37cbdc786", 0x3f}, {&(0x7f0000003100)="73734d1931f75fd72aaa3e91e9d09b5e883f2e4ba4ff74a70ea66d374f418ed6217b906607e01754f017c9824c1aab010e92c4d59aa3c3a683bb29c24eb1f1f0d3bb20002bacd184bd0b22be8f26810912355214f7743698c76200ccd9511e7004aa8ea4cc1b1717d1c122128ecda0af84322f9c2b176faaab141a10137c7b35bf91a320e02d38e19260cba5be91ef4dd91bb3c6a4d60f21317feaec0a3d95cfd6e1fc3ec4425cab1f8e41071437a1d6ffa0b66e7e0ff11938875dd60c5d3c1bc10d483e0f99ecd7a4ad293fb10eb4674bcb01caef1f8550e40ee87f39edca53fb9155a0fc38abf6512ce09f9d9a", 0xee}], 0x5, &(0x7f0000003280)=[{0x1010, 0x11, 0x8000, "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"}, {0x48, 0x109, 0xba14, "7ec8d193d765e7a0afe87b109be343685862253b2af264285b35acc915866fc2735b80854cce7a7f5c652e61c1c4367affb54a6f9640a73e"}, {0xf0, 0x103, 0x8, "dd3846842194718b221839152d60e065c7756cd6d1f47212bc2642175fb859a897748692d3e896c80f80017153406fb9fc4c983d0d03985c318547e35ff3292a49435d7941e60c33f32e5249ce6e7eaa3875fa718fded56296ab6a7f6ecb0984be9525857c651346bbbaf5bc0b4cf5483c41706f49421275c4a67a35bdc86dc86792907294f672f92e8045744b56514f13c798d2cb6145141e72be73a3b586d8bfbeaaedada0bc3b5c6bad19892cdb6457759b62216969f72a7b38c0615a7de22747f5e8e4e546ea6558408fa4457f3bfd7abfebe8b97f17e056833474ad"}, {0xe8, 0x0, 0x3f, "25e317900017498eecb7dd96831f4b607f4a5d699282e01886a6b24065dd93b7a9a6ed160ac0fd7d054abf9926f46c9cf38e911d0fa8b8504bb141485c80c7cbdf90d1ba7559fe6be389334ccf59094dc9fc3169da5855d026cc08829fb94a22205f8a196348389705fb665e7303bd349e22fd89a886b1a6f9c16e17f8efad811364b4571a3ce5a79d918748d294528520151d27357c50eed7b9c8a8c539c14c3fc4a554c15bdab5a705ab39420a5af1357adbb5fb6e236e254fe7f1004c13d27117388f3331dfa815149682d700d8c4beeece99aebb"}, {0x1010, 0x117, 0x2, "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"}, {0x100, 0x10a, 0x81, "a8439241c25c609c6a77b01857b42842ab5a564bce8c46ba1db6fc0c0924a983ff39854598225a2aaffb5279d399296cba9a813e283947a2a6fcc1a14bbdfd51eae1f12c42bb36c3dd12e71bea759b5162642c8df83e04b5bffd0fc37773429c19deaff8c61531a76c2cc3ee72f390e4b02085c9ad302b856ccb6b9d90b7972592aa8c1add7cd3ee384714ff4655d3197f403b0a530fea1eea240095510e8c67c033798be4f95305067617464fcb9584c2043deb8e6d808f2f315ad4d3050e761a1dcf58947ebda1fc9a93cbd9a59bc44b1e307899d693b1ffb1f8d53d206da8558c1347b55ae4469b4b662f8d0cde"}], 0x2340}}], 0x3, 0x800) dup2(r0, r1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) recvmmsg(r2, &(0x7f000000ab80)=[{{0x0, 0x0, &(0x7f0000005800)=[{&(0x7f0000005740)=""/111, 0x6f}, {&(0x7f00000057c0)=""/42, 0x2a}], 0x2, &(0x7f0000005840)=""/169, 0xa9}, 0x81}, {{&(0x7f0000005900)=@phonet, 0x80, &(0x7f0000006a40)=[{&(0x7f0000005980)=""/52, 0x34}, {&(0x7f00000059c0)=""/106, 0x6a}, {&(0x7f0000005a40)=""/4096, 0x1000}], 0x3, &(0x7f0000006a80)=""/95, 0x5f}, 0x4}, {{&(0x7f0000006b00)=@caif=@dbg, 0x80, &(0x7f0000006e40)=[{&(0x7f0000006b80)=""/172, 0xac}, {&(0x7f0000006c40)=""/23, 0x17}, {&(0x7f0000006c80)=""/247, 0xf7}, {&(0x7f0000006d80)=""/189, 0xbd}], 0x4}, 0x3}, {{&(0x7f0000006e80)=@ieee802154, 0x80, &(0x7f0000009380)=[{&(0x7f0000006f00)=""/6, 0x6}, {&(0x7f0000006f40)=""/216, 0xd8}, {&(0x7f0000007040)=""/151, 0x97}, {&(0x7f0000007100)=""/253, 0xfd}, {&(0x7f0000007200)=""/4096, 0x1000}, {&(0x7f0000008200)=""/115, 0x73}, {&(0x7f0000008280)=""/4096, 0x1000}, {&(0x7f0000009280)=""/167, 0xa7}, {&(0x7f0000009340)=""/19, 0x13}], 0x9}, 0x6e7}, {{0x0, 0x0, &(0x7f000000aa40)=[{&(0x7f0000009440)=""/203, 0xcb}, {&(0x7f0000009540)=""/4096, 0x1000}, {&(0x7f000000a540)=""/219, 0xdb}, {&(0x7f000000a640)=""/10, 0xa}, {&(0x7f000000a680)=""/249, 0xf9}, {&(0x7f000000a780)=""/12, 0xc}, {&(0x7f000000a7c0)=""/125, 0x7d}, {&(0x7f000000a840)=""/166, 0xa6}, {&(0x7f000000a900)=""/55, 0x37}, {&(0x7f000000a940)=""/195, 0xc3}], 0xa, &(0x7f000000ab00)=""/80, 0x50}, 0x8}], 0x5, 0x40010043, &(0x7f000000acc0)={0x77359400}) sendmsg$NFT_MSG_GETOBJ_RESET(r3, &(0x7f0000000a80)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4f85cd1717f762ed}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYRES32=r5, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f167933"]) perf_event_open(&(0x7f0000005680)={0x4, 0x80, 0x81, 0x2, 0x7c, 0x7f, 0x0, 0xc, 0x1a108, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x6, @perf_bp={&(0x7f0000005700), 0x2}, 0xc021, 0x7, 0x8, 0x7, 0x4, 0x25, 0x20, 0x0, 0x5}, 0xffffffffffffffff, 0x10, r6, 0x2) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x94, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2a}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @private2}, @IFLA_IPTUN_LINK={0x8, 0x1, r4}, @IFLA_IPTUN_TTL={0x5, 0x4, 0x1}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e22}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x3ff}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x94}}, 0x8044) 23:20:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0x40106726, 0x20000000) [ 443.468402][T11560] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 443.586273][T11560] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 23:20:57 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x8000000000000000, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:20:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0x40106726, 0x20000000) 23:20:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585e038", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0x40106726, 0x20000000) 23:20:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0x40106726, 0x20000000) 23:20:57 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7524d66}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000022c0)={0x50, 0xfffffffffffffffe, 0x0, {0x7, 0x22, 0x6, 0x2020, 0x8, 0x200, 0x0, 0x7}}, 0x50) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'xfrm0\x00'}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44708}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_ERSPAN_HWID={0x6}, @IFLA_GRE_REMOTE={0x8, 0x7, @loopback}]}}}]}, 0x4c}}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0xff, 0xf9, 0x4, 0x0, 0xe976, 0x30000, 0xa, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x309e, 0x4, @perf_config_ext={0x8, 0xc2ae}, 0x10000, 0x40, 0x7, 0x9, 0x8, 0x5, 0x30, 0x0, 0x8, 0x0, 0x9}, r1, 0x1, 0xffffffffffffffff, 0x1) 23:20:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x46, 0x0, 0x5, 0x2, 0x0, 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0xffffa888, 0xe, 0xfeffffff, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) creat(&(0x7f00000000c0)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20100, 0x100) 23:20:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:20:57 executing program 3: socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) getpid() timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYRES32=r1, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f167933"]) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000780)=@delqdisc={0x288, 0x25, 0x4, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x6, 0x3}, {0x3, 0x9}, {0xfffa, 0xfff3}}, [@TCA_STAB={0x80, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x3, 0x4, 0xa27f, 0x8, 0x1, 0x0, 0x6, 0x7}}, {0x12, 0x2, [0x7, 0x3f, 0xfffb, 0x0, 0x8000, 0x6, 0x9]}}, {{0x1c, 0x1, {0x1b, 0xd, 0x6, 0x3, 0x2, 0x5, 0x0, 0x1}}, {0x6, 0x2, [0x3ff]}}, {{0x1c, 0x1, {0x4, 0x6, 0xc1b, 0x7fff, 0x2, 0x1, 0x4c3, 0x3}}, {0xa, 0x2, [0x7, 0xc7a, 0x81]}}]}, @TCA_STAB={0xfc, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x20, 0x81, 0xfc12, 0x4, 0x0, 0x80000000, 0x1000, 0x5}}, {0xe, 0x2, [0xbc26, 0x1, 0x759, 0x800, 0x1]}}, {{0x1c, 0x1, {0x5, 0x46, 0x1, 0x5, 0x1, 0x1ff, 0x400, 0x1}}, {0x6, 0x2, [0x28]}}, {{0x1c, 0x1, {0x7, 0x81, 0x0, 0xa03, 0x0, 0x3, 0x8, 0x3}}, {0xa, 0x2, [0x9, 0xcd, 0xc5a0]}}, {{0x1c, 0x1, {0xff, 0x0, 0x7, 0x1, 0x2, 0x1, 0x80000001, 0x7}}, {0x12, 0x2, [0x230, 0x1000, 0x9, 0x1f, 0x1000, 0x9, 0x2]}}, {{0x1c, 0x1, {0x9, 0x9, 0x4, 0x4, 0x2, 0x101, 0x1, 0x3}}, {0xa, 0x2, [0xc14, 0x0, 0x4]}}, {{0x1c, 0x1, {0x7, 0x0, 0x7a, 0xe76, 0x0, 0xfffffffa, 0x200, 0x3}}, {0xa, 0x2, [0x7, 0x2, 0x0]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xfffffeff}, @qdisc_kind_options=@q_netem={{0xa}, {0x3c, 0x2, {{0x8, 0x3, 0x5, 0x8, 0x4, 0x1}, [@TCA_NETEM_RATE={0x14, 0x6, {0x80000001, 0x80, 0xf7, 0xd5d}}, @TCA_NETEM_REORDER={0xc, 0x3, {0x7ff, 0x7f}}]}}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x7}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x79aa}, @qdisc_kind_options=@q_netem={{0xa}, {0x74, 0x2, {{0x9, 0x7, 0x9, 0x3, 0xdcc2, 0x8}, [@TCA_NETEM_REORDER={0xc, 0x3, {0x20, 0xb39c}}, @TCA_NETEM_RATE={0x14, 0x6, {0x9, 0xfffffff7, 0xfffffff7, 0xffff}}, @TCA_NETEM_JITTER64={0xc, 0xb, 0x2}, @TCA_NETEM_DELAY_DIST={0xc, 0x2, "5e31f14056bf011b"}, @TCA_NETEM_RATE={0x14, 0x6, {0x80, 0x1, 0x4, 0x2}}, @TCA_NETEM_LATENCY64={0xc, 0xa, 0x1}]}}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}]}, 0x288}, 0x1, 0x0, 0x0, 0x20000080}, 0x8004850) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r3, 0x5, 0x5, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], &(0x7f0000002680)={0x0, 0x3938700}, 0x0) 23:20:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbb8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:20:57 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7524d66}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000022c0)={0x50, 0xfffffffffffffffe, 0x0, {0x7, 0x22, 0x6, 0x2020, 0x8, 0x200, 0x0, 0x7}}, 0x50) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'xfrm0\x00'}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44708}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_ERSPAN_HWID={0x6}, @IFLA_GRE_REMOTE={0x8, 0x7, @loopback}]}}}]}, 0x4c}}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0xff, 0xf9, 0x4, 0x0, 0xe976, 0x30000, 0xa, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x309e, 0x4, @perf_config_ext={0x8, 0xc2ae}, 0x10000, 0x40, 0x7, 0x9, 0x8, 0x5, 0x30, 0x0, 0x8, 0x0, 0x9}, r1, 0x1, 0xffffffffffffffff, 0x1) [ 444.362717][T11596] device erspan1 entered promiscuous mode 23:20:58 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0xffffffff00000000, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:20:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:20:58 executing program 5: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='configfs\x00', 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005800)=[{{&(0x7f0000000700), 0x6e, &(0x7f0000000000)=[{0x0}], 0x1}}, {{&(0x7f0000000a00), 0x6e, 0x0}}, {{&(0x7f0000000e80), 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000f00)=""/4096, 0x1000}, {&(0x7f0000001f00)=""/103, 0x67}], 0x2, &(0x7f0000002f80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000014000000000004000000010000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x58}}, {{&(0x7f0000003000), 0x6e, &(0x7f00000032c0)=[{&(0x7f0000003080)=""/15, 0xf}, {&(0x7f00000030c0)=""/137, 0x89}, {&(0x7f0000003180)=""/191, 0xbf}, {&(0x7f0000003240)=""/23, 0x17}, {&(0x7f0000003280)=""/19, 0x13}], 0x5, &(0x7f0000003340)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000003380)=@abs, 0x6e, &(0x7f0000003480)=[{&(0x7f0000003400)=""/91, 0x5b}], 0x1}}, {{0x0, 0x0, &(0x7f0000003a80)=[{&(0x7f0000003540)=""/101, 0x65}, {&(0x7f00000035c0)=""/146, 0x92}, {&(0x7f0000003680)=""/220, 0xdc}, {&(0x7f0000003780)=""/162, 0xa2}, {&(0x7f0000003840)=""/24, 0x18}, {0x0}, {&(0x7f0000003a00)=""/33, 0x21}, {&(0x7f0000003a40)=""/42, 0x2a}], 0x8, &(0x7f0000003b40)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb0}}, {{&(0x7f0000003c80)=@abs, 0x6e, &(0x7f0000005240)=[{0x0}, {&(0x7f0000003e00)=""/27, 0x1b}, {&(0x7f0000003e40)=""/253, 0xfd}, {&(0x7f0000003f40)=""/4096, 0x1000}, {&(0x7f0000004fc0)=""/84, 0x54}, {&(0x7f0000005040)=""/219, 0xdb}, {&(0x7f0000005140)=""/180, 0xb4}, {&(0x7f0000005200)}], 0x8, &(0x7f0000005300)=ANY=[@ANYBLOB="1400e91d000000deb39295d0d7", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32], 0x38}}, {{0x0, 0x0, &(0x7f00000056c0)=[{&(0x7f00000053c0)=""/129, 0x81}, {&(0x7f0000005580)=""/140, 0x8c}, {&(0x7f0000005640)=""/74, 0x4a}], 0x3, &(0x7f0000005700)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}}], 0x8, 0x0, &(0x7f0000005a00)) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7765726469723d2e3a66df87bb00"]) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000380)='./bus\x00', &(0x7f00000003c0), &(0x7f0000000900)=ANY=[], 0x87, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) open(&(0x7f0000000480)='./file1\x00', 0xa800, 0x59) lsetxattr$security_evm(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000540)='./bus\x00', &(0x7f0000000600), &(0x7f0000000400)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) chdir(&(0x7f00000001c0)='./bus\x00') tkill(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') ptrace$setregs(0xf, 0x0, 0x652, &(0x7f0000000c40)="a5150bb98657464491bd730c7d0c07b773ce3f7143770dcb3c70adb4d337558acef41bb618f29975ee4e3926f0cb34347b4b519f4793d84a528cf66ffd6e618991347e3faa018461f6c5e67cc22e25419b3a9b7f54ef6ab75f48a0e4c295da36573401e509e60f0c02e7e8311df38256eddb2035aa87dc8b4a90") gettid() 23:20:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35002dd169708a1caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f166d33d2cd92987634e78adac4e36886fb800cf49f61039b72311cc01754af37fcca92119ce409983ce2a23c00f90761dc25c59538fd55df9c982f7215414e1ce4f02eaee68ec1211ec28fc4de2ce9c32dbd2627768bfc71"]) unshare(0x40400) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) [ 445.010913][T11613] overlayfs: failed to resolve 'f߇»': -2 [ 445.038180][T11613] overlayfs: failed to resolve 'f߇»': -2 [ 445.051970][T11613] overlayfs: filesystem on './bus' not supported as upperdir 23:20:58 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001200)=@newqdisc={0x30, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x8, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [""]}, 0x1c}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) write$P9_RREADDIR(r2, &(0x7f0000000100)=ANY=[], 0xbf) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) r4 = getpid() r5 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r5, 0x401870c8, &(0x7f0000000040)={0xf18}) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000000640)={0x2, 0xbc, "640f4a43982d5d59f3ec5fd17061d7e1c23794f2ff8485b1b732fb37f50bc0faf368e31ea6d6663c95a331d64af8618ac2484f2b5ef8f7ccb7b82fc5e398e98b07bc2fec8677eb2b056947c06b6904b544c7e7a6a0e592ac341464f2eaa4b9fcad501c58496bbb2327684689bc5a818fbcee21558b6e7c145dd8a13eccdad1f9f0ff60f92b5fbd7a55d1e722a42e38c41f234eac4ffdcaeabfb36dda796c7e8a4b728bc470436e0ec2b1c553e86dbd42ac52d72e1ed4293a0f83bf4d"}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r1, 0x0, 0x1, &(0x7f0000000340)='\x00'}, 0x30) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000007c0)=@deltaction={0x1d4, 0x31, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}, @TCA_ACT_TAB={0x50, 0x1, [{0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5155}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}, @TCA_ACT_TAB={0x30, 0x1, [{0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0x10, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xea8}}]}, @TCA_ACT_TAB={0x50, 0x1, [{0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}, @TCA_ACT_TAB={0x54, 0x1, [{0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfc1}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7f}}, {0x14, 0xe, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xc8}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x1c, 0x1, [{0xa, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x33}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x6c, 0x1, [{0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x75e}}, {0x10, 0x108, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x54cb}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1ff}}, {0x10, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xffff}}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4000881}, 0x8000) 23:20:58 executing program 1: r0 = socket(0x10, 0x8000000000000003, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400), 0x80, 0x0}}], 0x1, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f00000001c0), 0x0, 0x40881) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') preadv(r2, &(0x7f00000017c0), 0x333, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) bind(r3, &(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @local}}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="9ae398bf"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001100)=@delchain={0x34, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8}, {0x8, 0x2, [@TCA_BPF_ACT={0x4}]}}]}, 0x34}}, 0x0) 23:20:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:58 executing program 3: socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) getpid() timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYRES32=r1, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f167933"]) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000780)=@delqdisc={0x288, 0x25, 0x4, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x6, 0x3}, {0x3, 0x9}, {0xfffa, 0xfff3}}, [@TCA_STAB={0x80, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x3, 0x4, 0xa27f, 0x8, 0x1, 0x0, 0x6, 0x7}}, {0x12, 0x2, [0x7, 0x3f, 0xfffb, 0x0, 0x8000, 0x6, 0x9]}}, {{0x1c, 0x1, {0x1b, 0xd, 0x6, 0x3, 0x2, 0x5, 0x0, 0x1}}, {0x6, 0x2, [0x3ff]}}, {{0x1c, 0x1, {0x4, 0x6, 0xc1b, 0x7fff, 0x2, 0x1, 0x4c3, 0x3}}, {0xa, 0x2, [0x7, 0xc7a, 0x81]}}]}, @TCA_STAB={0xfc, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x20, 0x81, 0xfc12, 0x4, 0x0, 0x80000000, 0x1000, 0x5}}, {0xe, 0x2, [0xbc26, 0x1, 0x759, 0x800, 0x1]}}, {{0x1c, 0x1, {0x5, 0x46, 0x1, 0x5, 0x1, 0x1ff, 0x400, 0x1}}, {0x6, 0x2, [0x28]}}, {{0x1c, 0x1, {0x7, 0x81, 0x0, 0xa03, 0x0, 0x3, 0x8, 0x3}}, {0xa, 0x2, [0x9, 0xcd, 0xc5a0]}}, {{0x1c, 0x1, {0xff, 0x0, 0x7, 0x1, 0x2, 0x1, 0x80000001, 0x7}}, {0x12, 0x2, [0x230, 0x1000, 0x9, 0x1f, 0x1000, 0x9, 0x2]}}, {{0x1c, 0x1, {0x9, 0x9, 0x4, 0x4, 0x2, 0x101, 0x1, 0x3}}, {0xa, 0x2, [0xc14, 0x0, 0x4]}}, {{0x1c, 0x1, {0x7, 0x0, 0x7a, 0xe76, 0x0, 0xfffffffa, 0x200, 0x3}}, {0xa, 0x2, [0x7, 0x2, 0x0]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xfffffeff}, @qdisc_kind_options=@q_netem={{0xa}, {0x3c, 0x2, {{0x8, 0x3, 0x5, 0x8, 0x4, 0x1}, [@TCA_NETEM_RATE={0x14, 0x6, {0x80000001, 0x80, 0xf7, 0xd5d}}, @TCA_NETEM_REORDER={0xc, 0x3, {0x7ff, 0x7f}}]}}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x7}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x79aa}, @qdisc_kind_options=@q_netem={{0xa}, {0x74, 0x2, {{0x9, 0x7, 0x9, 0x3, 0xdcc2, 0x8}, [@TCA_NETEM_REORDER={0xc, 0x3, {0x20, 0xb39c}}, @TCA_NETEM_RATE={0x14, 0x6, {0x9, 0xfffffff7, 0xfffffff7, 0xffff}}, @TCA_NETEM_JITTER64={0xc, 0xb, 0x2}, @TCA_NETEM_DELAY_DIST={0xc, 0x2, "5e31f14056bf011b"}, @TCA_NETEM_RATE={0x14, 0x6, {0x80, 0x1, 0x4, 0x2}}, @TCA_NETEM_LATENCY64={0xc, 0xa, 0x1}]}}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}]}, 0x288}, 0x1, 0x0, 0x0, 0x20000080}, 0x8004850) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r3, 0x5, 0x5, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], &(0x7f0000002680)={0x0, 0x3938700}, 0x0) 23:20:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:20:58 executing program 1: r0 = socket(0x10, 0x8000000000000003, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400), 0x80, 0x0}}], 0x1, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f00000001c0), 0x0, 0x40881) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') preadv(r2, &(0x7f00000017c0), 0x333, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) bind(r3, &(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @local}}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="9ae398bf"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001100)=@delchain={0x34, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8}, {0x8, 0x2, [@TCA_BPF_ACT={0x4}]}}]}, 0x34}}, 0x0) 23:20:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb78", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:59 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="23212008c12b9523c1452e2f66696c653020205b232e7b5c402f78719834de331686530356aa202f5c20292120000000801d8c46dae91c59"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/24, 0x18}], 0x1}, 0x40002101) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:20:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) unshare(0x40400) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:20:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbb8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb78", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:20:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:20:59 executing program 5: r0 = socket(0x10, 0x8000000000000003, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400), 0x80, 0x0}}], 0x1, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f00000001c0), 0x0, 0x40881) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') preadv(r2, &(0x7f00000017c0), 0x333, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) bind(r3, &(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @local}}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="9ae398bf"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001100)=@delchain={0x34, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8}, {0x8, 0x2, [@TCA_BPF_ACT={0x4}]}}]}, 0x34}}, 0x0) 23:20:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:20:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:20:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35002dd169708a1caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f166d33d2cd92987634e78adac4e36886fb800cf49f61039b72311cc01754af37fcca92119ce409983ce2a23c00f90761dc25c59538fd55df9c982f7215414e1ce4f02eaee68ec1211ec28fc4de2ce9c32dbd2627768bfc71"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:20:59 executing program 5: r0 = socket(0x10, 0x8000000000000003, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400), 0x80, 0x0}}], 0x1, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f00000001c0), 0x0, 0x40881) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') preadv(r2, &(0x7f00000017c0), 0x333, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) bind(r3, &(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @local}}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="9ae398bf"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001100)=@delchain={0x34, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8}, {0x8, 0x2, [@TCA_BPF_ACT={0x4}]}}]}, 0x34}}, 0x0) 23:20:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:00 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="2361202e2f66696c653020205b232e7b63402f20202f50202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a0fbfe5ca855630b38403c9de32479b17c436f79c2e1ec2bc4947bc7a1d22705e1ba95b7e93c2f05bd4e7c30d134b00b87ba1b331d1b09753638f9ad4ebe46438a9e53223180e333f003c4216bd2dee10"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000080)) dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000000340)=""/222, 0xde}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000180)={0xcb, 0x6d, 0x2}, 0x7) 23:21:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:00 executing program 5: r0 = socket(0x10, 0x8000000000000003, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400), 0x80, 0x0}}], 0x1, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f00000001c0), 0x0, 0x40881) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') preadv(r2, &(0x7f00000017c0), 0x333, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) bind(r3, &(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @local}}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="9ae398bf"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001100)=@delchain={0x34, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8}, {0x8, 0x2, [@TCA_BPF_ACT={0x4}]}}]}, 0x34}}, 0x0) 23:21:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35002dd169708a1caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f166d33d2cd92987634e78adac4e36886fb800cf49f61039b72311cc01754af37fcca92119ce409983ce2a23c00f90761dc25c59538fd55df9c982f7215414e1ce4f02eaee68ec1211ec28fc4de2ce9c32dbd2627768bfc71"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:00 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0xa2a, @remote, 0x1}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c358ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268292014a5a9687e1386983b44aed8d8eb3d50b11947790d9839387d0100d13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125592f369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28ec3142f14fcd0679d1be21075f1b203e7e66ecc1cac24c6f7ce650d62e6e500d3e403214dfaf4721cf473487cd476eefebc5d52912125fd767839d939a4f3c6ab8e6d653ff588d266afedf79a9e5f7aad66bc66e8f35853fd9161"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb78", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:01 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000080)) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f00000000c0)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0x40106726, 0x20000000) 23:21:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35002dd169708a1caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f166d33d2cd92987634e78adac4e36886fb800cf49f61039b72311cc01754af37fcca92119ce409983ce2a23c00f90761dc25c59538fd55df9c982f7215414e1ce4f02eaee68ec1211ec28fc4de2ce9c32dbd2627768bfc71"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0x40106726, 0x20000000) 23:21:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbb8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:01 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback, 0xfffffffe}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540), 0x0, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/143, 0x8f}, 0xffffff7f}], 0x3, 0x1, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000500)=0x6) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$incfs(r3, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0x40106726, 0x20000000) 23:21:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0x40106726, 0x20000000) 23:21:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35002dd169708a1caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f166d33d2cd92987634e78adac4e36886fb800cf49f61039b72311cc01754af37fcca92119ce409983ce2a23c00f90761dc25c59538fd55df9c982f7215414e1ce4f02eaee68ec1211ec28fc4de2ce9c32dbd2627768bfc71"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0x40106726, 0x20000000) 23:21:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0x40106726, 0x20000000) 23:21:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) socket$inet6_udplite(0xa, 0x2, 0x88) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$incfs(r2, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0x40106726, 0x20000000) 23:21:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0x40106726, 0x20000000) 23:21:01 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc5663be020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a1ad38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3e41020188b3f2efc2e56555bed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252ebfb97d4f379cfd74ff503935ec223d90d284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d73602"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_UPDATE_FT_IES(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000600)={0x364, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x3ee00692, 0xe}}}}, [@NL80211_ATTR_IE={0x2a0, 0x2a, [@ht={0x2d, 0x1a, {0x400, 0x1, 0x1, 0x0, {0x80, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1, 0x2, 0x1}, 0x300, 0xcd, 0x1}}, @perr={0x84, 0x22, {0xf1, 0x2, [@not_ext={{}, @device_b, 0x7fffffff, "", 0x25}, @ext={{}, @device_a, 0x2, @device_b, 0x9}]}}, @cf={0x4, 0x6, {0xf8, 0x8, 0x1, 0x40}}, @random_vendor={0xdd, 0x5f, "48bff4f6ec6769c022dd1596b08f8060fd40dc3cd715febd610c75981da518af4390950acfe1f308667818b59a40af4bec427a2c4a4f5896c4d8e704fa52b3b9445d69fa52a1453f1ed5ea2fafb91a36d0589e0855e4fc99217687f262533f"}, @fast_bss_trans={0x37, 0x7f, {0x9, 0x3, "f5847db683bc87489523b244bf4fce59", "61297e552744663b58aec07941ead736d48270195d2a443c081446bf89024f3b", "7f7f8bf9b2ad627adf442f09f6affb8527ed9c4bb34c62bda53019a2c535582b", [{0x2, 0xa, "1eeb05009825d3367b56"}, {0x3, 0x6, "8d622e73d9e3"}, {0x4, 0x17, "b04b9933e62d99d9472d865b8fd8a8ae644f20921918cd"}]}}, @random={0x81, 0xd3, "0bd16809cc624546a113e7e4b8969ddc48ef37bb4a36028eb1464cd97ebd3ac851ca88e06ba3fbd90612a9d301563fea79914a2da49eb126ebc836c19065ef3987829fdfff9dc255e597ba2d91ff3ca6523aafd3744354df41a3fce18e4c145762828a3746b827fba4a8a23ee9e68d37ee273385a2f3d725b3cd7241be1c61c306205b619a5a4d038d2c081d1aed38e7d1e8f33e6ba242b4568a1281c73c75128924dc4906b85c87396fe26c7cdc78c0968a1f5453d27bfda035d6382ffc77aaf6908afde4265c0f71bf65b513e4951be5f8d1"}, @random={0x1, 0x6f, "705d082a1759e705dca325d2509be3ee1c4ce84d802e7d354f84ab65155e5315abdae3c26e8b59ebf0c55722ad8ceb6bad916570a26784d3c61d651398e70594eafa040ead1379d1a2cad766bec72011de18e64d59dbc1fbefa96492eced64807d3709316a66b4a8cb9a2aac94cdbb"}, @ht={0x2d, 0x1a, {0x4000, 0x3, 0x7, 0x0, {0x711, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x3}, 0x300, 0x40, 0xff}}, @mesh_id={0x72, 0x6}, @cf={0x4, 0x6, {0x96, 0xbd, 0xf8d3, 0x15b9}}]}, @NL80211_ATTR_IE={0xa3, 0x2a, [@mesh_chsw={0x76, 0x6, {0x80, 0x7, 0x7, 0x6}}, @cf={0x4, 0x6, {0x5, 0x6d, 0x1, 0x6}}, @preq={0x82, 0x62, @ext={{0x0, 0x1}, 0x4, 0x9, 0x6, @broadcast, 0xfff, @device_b, 0x5, 0x0, 0x6, [{{0x1, 0x0, 0x1}, @device_b, 0x9}, {{}, @device_b, 0x2}, {{0x0, 0x0, 0x1}, @broadcast, 0x9}, {{}, @device_a, 0x4}, {{0x1, 0x0, 0x1}, @device_b, 0x20}, {{0x1, 0x0, 0x1}, @broadcast, 0xa87e}]}}, @tim={0x5, 0x29, {0xec, 0xf1, 0x1, "e2634fceaf488aeb853ad83737b60c8181b5211a88bfad31c7bb7bcb67e072acdd339d4eb80e"}}]}]}, 0x364}, 0x1, 0x0, 0x0, 0x20000000}, 0x5) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$incfs(r2, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0x40106726, 0x20000000) 23:21:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35002dd169708a1caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f166d33d2cd92987634e78adac4e36886fb800cf49f61039b72311cc01754af37fcca92119ce409983ce2a23c00f90761dc25c59538fd55df9c982f7215414e1ce4f02eaee68ec1211ec28fc4de2ce9c32dbd2627768bfc71"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:01 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000080)={0x9, 0x3fd, 0x6}) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:01 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$incfs(r1, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0x40106726, 0x20000000) 23:21:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:01 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe12eac6fd839e00f4343bb4c7fcf1d4e1e042d4baef7dbf3414a1c4b0a9afc45940269d0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db08e0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590a6e8e9628d82725b4bf8e1de01a5c8e06d00400a67adf35002dd169708a1caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb4926561a2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013aaa003cc71f166d33d2cd92987634e78adac4e36886fb800cf49f61039b72311cc01754af37fcca92119ce409983ce2a23c00f90761dc25c59538fd55df9c982f7215414e1ce4f02eaee68ec1211ec28fc4de2ce9c32dbd2627768bfc71"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:01 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000)=0x800000, 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$incfs(r1, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0x40106726, 0x20000000) 23:21:01 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:01 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:01 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x81, 0x8, 0x3, 0x0, 0x0, 0xffff, 0x10908, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_bp={&(0x7f0000000080), 0x6}, 0x140, 0x4, 0x7, 0x2, 0x0, 0x9, 0x80, 0x0, 0x80, 0x0, 0x2}, 0xffffffffffffffff, 0xa, r0, 0x3) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:01 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:01 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921205708821d8c46dae91c5943eb73a07a060f95cf7203733597492a855630066886ca99f26512d1e3e2da228a34898682a64c92c4cf1f6063c5f438d467ed3813a251cd60b81c79d5d22d4ad59e0831cfd07b9356e6fbe38e64cd14a186e288f1d1d9d024d818b2733bc0b9e905a151513e8fd19dc7ee98c8e1abf2fb196b1fa3d2e29ec846561ef62587b2d9d2ea27e39de8f92d05b092c300"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0x40106726, 0x20000000) 23:21:01 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x800000, 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb78", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:01 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f63696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9b940268d6b154f973c634ab2ab6c15e222bb8be730a8b89fb1ed0642165b0433a5797984783268866191537593ed95d4015b1ea1933b3d1bde3a4f1ca1d8dc39b509f89e1377a0d654b5d9a1712453"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r1, &(0x7f0000000280)=""/196, 0xc4, 0x22, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3c}, 0x20020}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/106, 0x6a}, {&(0x7f0000000140)=""/15}, {&(0x7f0000005340)=""/223, 0x7}, {&(0x7f0000000600)=""/102, 0x66}, {&(0x7f0000000780)=""/85, 0x55}], 0x6, &(0x7f00000055c0)=""/70, 0x4e}, 0x2100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000800)=""/149, 0xa4}, 0xf7ffff81}], 0x3, 0x2000, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:01 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x800000, 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0x40106726, 0x20000000) 23:21:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:01 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="06bea69a2a1589e1ea84801698ca0d2e41c61d07a0239e2976883d848acf879c47138871", 0x24, 0x48c4, 0x0, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:01 executing program 4: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbb8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0x40106726, 0x20000000) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="1d6797797600e33cb93620f6006da07fd1fef43190461d3e7cbc5fa62ff0ccd3680baf76f4a392dadaefdd355e5620d6757560d7ef789c9e16dd98732050eb61350bb2a5caed5748123a5577cb4eb78a0f54347d5b3cd628fd2165133ea5ce0189052f4cd5e5bd4c0876246be6bdc268be047a744eb055414233f8722ee11627ea7106b480212da8af7f264e3f33d1e398cc6929251c1fcffcc3aaa559999742970f60d6f89233fce6b33b8afc82449102fb5fa041d8d950c5dcb77e71e2935b8b79aa4f8324f8bff92ebdac9c4b898080eb89338caa0e173d1828f517a024697c65b3ec7c574935"], 0x3d) syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800), 0x0, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x6d, 0x1}, 0x7) 23:21:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000425bd7000ffdbdf25020000002400018008000300030000000800030003000000080003000300020008000100", @ANYRES32=0x0, @ANYBLOB], 0x38}, 0x1, 0x0, 0x0, 0x884}, 0x24000011) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfffffffffffffc62) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0, 0x30}}, {{0x0, 0x0, &(0x7f0000005540), 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/43, 0x2b}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000500)=0x6) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$incfs(r3, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0x40106726, 0x20000000) 23:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f2020c79bb2b021200a5708821d8c46dae91c5943eb73a07a060f95cf7203732517492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000080)={{{@in=@rand_addr=0x64010100, @in6=@loopback, 0x4e21, 0x1, 0x4e20, 0x7, 0xa, 0xa0, 0xa0}, {0x7, 0x35, 0x0, 0x480a, 0xdb, 0x1000, 0x101, 0x75bf0a99}, {0x6, 0x3, 0x5, 0x6}, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0x2, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3507, 0x4, 0x3, 0x0, 0x3, 0x40, 0x7}}, 0xe8) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/82, 0x52}, 0x7fffffff}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, 0x0, 0x200, 0x70bd26, 0x5, {{}, {@void, @val={0xc, 0x99, {0x5, 0x6c}}}}, [@NL80211_ATTR_PS_STATE={0x8}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x4801) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x80000, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$incfs(r2, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0x40106726, 0x20000000) 23:21:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000500)=0x6) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$incfs(r3, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0x40106726, 0x20000000) 23:21:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$incfs(r2, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0x40106726, 0x20000000) 23:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x100000}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000000c0)={0x3c, 0x4, 0x2, 0x9d, 0x0, [@local, @private0]}, 0x28) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$incfs(r2, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0x40106726, 0x20000000) 23:21:02 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$incfs(r1, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0x40106726, 0x20000000) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xc0000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0x2, 0x0, 0x0, 0x0, 0xffff, 0x0, 0xffff, 0x0, 0x10005, 0x0, 0xcd7e}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb7da07a060f95cf7203732597492a855630b33f94c99e9df0371d4b27e343080ada1f429190fa61c17c0cde45fa7cf027a2e2"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r2) 23:21:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb78", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:02 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000)=0x800000, 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$incfs(r1, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0x40106726, 0x20000000) 23:21:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$incfs(r2, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0x40106726, 0x20000000) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000200000000800000000000000ff030000000000000000000000000000000000000000000000000000000000000000000000004b0000006a1f000000000000000000000000000000000019e900b200000080000000000000000000"], 0x78) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$incfs(r1, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0x40106726, 0x20000000) 23:21:02 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(0xffffffffffffffff, 0x40309410, &(0x7f0000000080)={0xfffffffffffffffe, 0x100, 0x3, 0x6, 0x1, [0x9, 0x8, 0x8001, 0x1]}) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000)=0x800000, 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$incfs(r1, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0x40106726, 0x20000000) 23:21:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) [ 449.280141][T11918] incfs: Backing dir is not set, filesystem can't be mounted. 23:21:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbb8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:02 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/mcfilter\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0xa7, @remote, 0x4000005}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffff}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$setlease(r0, 0x400, 0x1) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) [ 449.406384][T11936] incfs: Backing dir is not set, filesystem can't be mounted. 23:21:02 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x800000, 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x800000, 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:02 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x800000, 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) [ 449.496417][T11948] incfs: Backing dir is not set, filesystem can't be mounted. 23:21:02 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x800000, 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 3: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb78", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231a01000100000000005ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657a46804a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a88d385866854129720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000780)={0x2c, 0x0, 0x0, 0x10}, 0x10, &(0x7f0000000700)=[{&(0x7f00000000c0)="eecb9f8d371f196a6d2b6185ef7aa880f79857bc7df26cf6f16ecbbf9de66bbb81f4c9a0de5a3a7764aced27ee52f1ef53e5a2d4a5061d988cd647bb9dad16b895cdf83988dde31483f3097737492736bb2243c2201f230ac0efae77a9a127b6f56c8800e0094e07c37794f4f4b5336bcdb8031a64b2fc5ef2ee732426ff84967264c311c8023725621ffeb5e1817dcf0743feb7d69de6b1470076d06b83aa0e7e8d527c8637af", 0xa7}, {&(0x7f0000000280)="7565d2807b5c1fa48638f600d07828e11ee8e2fc6e12b054fdf1c64392e03fcad1608875a5d95609d588e1403574400e3071c80342c1df2fc87bbda58b1c81559c66f6e1d3213e38e7881db79779d5431a8ac08224e66af0c60629548a0851f07cc46e7fa6bc0847c097dcb5506cd0a2ecf824d8c03e55fcfd121c120b5e8ad27da72708e4467ce1bba78e1ad2c0d94dbc792ec9024a0e0b97255f006d3700cb8aea8f99b1c266b74ad4f419703925856745", 0xb2}, {&(0x7f0000000340)="a694cf91fdc01bdf8e6e92b956d5eb3e8169fb9779648547b873572008e895cce5666e9de242ce9c1ca5cf57f5ec8ad940c158495574be12564f920f4172723b6b7b91a3a550e45171904e278c77e9290f6bd704177065f067ca0fec46387bdda27ed547d6754d7cef8f4d4e922a0a48136001d1c9e10d", 0x77}, {&(0x7f00000003c0)="ad8df17510ab0b63ab58b7886c4aaf5b75a8b9ac663234a1bd9983bafb8238b65638b27aa7ee214ea3b7d71681d8583f07e10d705b9126020f092d67fea4b0b189f8fa3ca56a519e912f031c753dd571a1558c9aca257938e780c7f79cb993b661de2e16c92f3422987cb6fe110154a99814d4b01c61aee23600e1d59d8fe7b2d25ed2b77940a08e064482f4", 0x8c}, {&(0x7f0000000600)="64870b56c0a6a16e3eec8c0eef2d11d1fc3a51563c41a7c075329b75d39efdac65607f0f5ad98420cb084242e9606728f3ec8af4a302436f0eba92d23258d2954a590a468a9aa8f78ebe53c4c574ee12603fc6d12d9fa01e7bf3d7e421bf6cb3df5e04e0fc6be6aa5b82f0ab8972ab6edd02727492aea0ba7824129acb1933675d8b626e73f2e0b34e61622f546e1e91afd145133d5674b0c2f33920ba6a75e6eb2cbb0b32f6040ec5d4dcaed8e6f900395ef0c409df6e427b0000d071f9dfe37a83ea806fe17fc05b741a114352ea7de4a2131e90dd8b04a800623e6c", 0xdd}], 0x5, 0x0, 0x0, 0x10001}, 0x8092) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup3(r2, r2, 0x0) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x5c0}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203582597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYRES16=r0], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x6, 0x2, 0x1, 0x3, 0x0, 0x100, 0x10090, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x81, 0x80}, 0x40090, 0x4, 0x8, 0x0, 0x5, 0x80000001, 0xd1, 0x0, 0x13, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/56, 0x38}, {&(0x7f0000005700)=""/213, 0xe8}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}, {{&(0x7f0000000100)=@xdp, 0x0, &(0x7f0000000180)=[{&(0x7f0000000280)=""/203}, {&(0x7f00000004c0)=""/4096}, {&(0x7f00000014c0)=""/4096}], 0x0, &(0x7f0000000380)=""/229}, 0x4}, {{&(0x7f00000024c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x0, &(0x7f0000002600)=[{&(0x7f0000002540)=""/192}]}, 0x8001}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0xffffffffffffffdf}, 0xfffffffffffffdd7) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e1d, 0x0, @rand_addr=' \x01\x00'}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in=@empty, @in=@remote, 0x4e24, 0x800, 0x4e20, 0x0, 0x2, 0xa0, 0x0, 0x6, 0x0, 0xee01}, {0x5, 0x3, 0x3, 0x7, 0x100, 0x1, 0x6, 0x10001}, {0x5, 0x9401, 0x400, 0x6}, 0xffff, 0x6e6bb8, 0x0, 0x1, 0x2, 0x6}, {{@in6=@mcast1, 0x4d6, 0x969d0840c650bd1d}, 0xa, @in=@empty, 0x3507, 0x2, 0x1, 0x0, 0x4, 0x10000, 0x1000}}, 0xe8) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) [ 450.026778][T12036] incfs: Backing dir is not set, filesystem can't be mounted. 23:21:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x20000097}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/329], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x20000000}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x7ffff000}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0)="48f943e267bda393df74b322c8dca361353cef7c4cac9d96ddd8c0002b", 0x1d, 0x20008000, &(0x7f0000000100)={0xa, 0x4e23, 0xfffffffa, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0x40106726, 0x20000000) 23:21:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) [ 450.114886][T12046] incfs: Backing dir is not set, filesystem can't be mounted. [ 450.124529][T12048] incfs: Backing dir is not set, filesystem can't be mounted. 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000000080)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000180)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0x40106726, 0x20000000) 23:21:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866304c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) [ 450.192150][T12065] incfs: Backing dir is not set, filesystem can't be mounted. [ 450.204494][T12059] incfs: Backing dir is not set, filesystem can't be mounted. 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000500)=0x6) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$incfs(r3, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0x40106726, 0x20000000) 23:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000600)=@dellinkprop={0x248, 0x6d, 0x20, 0x70bd26, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x6040, 0x100}, [@IFLA_AF_SPEC={0x120, 0x1a, 0x0, 0x1, [@AF_INET={0x48, 0x2, 0x0, 0x1, {0x44, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x1000}, {0x8, 0x20, 0x0, 0x0, 0x101}, {0x8, 0x3, 0x0, 0x0, 0x18000000}, {0x8, 0xc, 0x0, 0x0, 0x1}, {0x8, 0x9, 0x0, 0x0, 0x2}, {0x8, 0x1d, 0x0, 0x0, 0x94}, {0x8, 0xf, 0x0, 0x0, 0xfffffe01}, {0x8, 0xc, 0x0, 0x0, 0x1}]}}, @AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @empty}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_TOKEN={0x14, 0x7, @private2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x40}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}]}, @AF_INET={0x50, 0x2, 0x0, 0x1, {0x4c, 0x1, 0x0, 0x1, [{0x8, 0x2, 0x0, 0x0, 0x2}, {0x8, 0x1f, 0x0, 0x0, 0x8}, {0x8, 0x19, 0x0, 0x0, 0x800}, {0x8, 0xc, 0x0, 0x0, 0x1}, {0x8, 0x18, 0x0, 0x0, 0x1}, {0x8, 0x13, 0x0, 0x0, 0x5}, {0x8, 0xe, 0x0, 0x0, 0x7fff}, {0x8, 0x8, 0x0, 0x0, 0xf5c3}, {0x8, 0x5, 0x0, 0x0, 0x74f65487}]}}, @AF_BRIDGE={0x4}, @AF_MPLS={0x4}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x200}, {0x8, 0x0, 0x0, 0x0, 0x1}, {0x8, 0x10, 0x0, 0x0, 0x8001}, {0x8, 0x1c, 0x0, 0x0, 0x7f}, {0x8, 0x9, 0x0, 0x0, 0x3}, {0x8, 0x1a, 0x0, 0x0, 0xffffffe0}]}}]}, @IFLA_NET_NS_PID={0x8, 0x13, 0xffffffffffffffff}, @IFLA_VF_PORTS={0x100, 0x18, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x7f}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xa, 0x2, '!@:\\\x1b\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "e3904b87d731366b8c90a2c65460c591"}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3f}]}, {0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "fb5fad7605589c5f1b8b906ca5f84850"}, @IFLA_PORT_PROFILE={0x19, 0x2, '(-\t\'}^){]),/#}&^({:%\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xffffffff}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_VF={0x8, 0x1, 0x4}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7c}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "6876ccc5ac4e5ca5d3c87eb9697734fa"}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xffffff6c}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ba1ea84e382fddabf3c97b251214d39f"}, @IFLA_PORT_VF={0x8, 0x1, 0xe00000}]}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) [ 450.239781][T12074] incfs: Backing dir is not set, filesystem can't be mounted. 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0x40106726, 0x20000000) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866310c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) socket$inet6_udplite(0xa, 0x2, 0x88) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$incfs(r2, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0x40106726, 0x20000000) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200400d8, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x25}}, 0x14) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe8104ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$incfs(r2, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0x40106726, 0x20000000) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x5, 0x9, 0x4, 0x52, 0x3, 0x6, 0xfff, 0x369, 0x40, 0xb7, 0x9, 0x2, 0x38, 0x2, 0x9, 0x50cf, 0x401}, [{0x4, 0xb056, 0x6, 0x100, 0x9, 0x427d7492, 0x7, 0x2}], "a0b601e5a3fe146ca0bfbf88d0d91864014879ec19a363108a9d9282e8e3f0022bb88b1f0bf204c5549b06dbd0755b875bb063deba1cabda0cea1ba1a36f5fa62cb236ef83e7dbe7acf494de8e9b77db1755b2e00543297390008d80ecbbd92195aba8b4b3b7bba7444d7f16ac9aa856b999cc800162304fa56a480932ba2f49fe4a75deb44222c84d8ae8b0f8ddd14b51820243660e366e3c8a7fdb779cb50bef96507896341dd9bb67d039858b764d", ['\x00', '\x00', '\x00', '\x00']}, 0x528) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000)=0x800000, 0x12) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$incfs(r1, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0x40106726, 0x20000000) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821db7a98c46dae91c5943eb73a07a060f95cf4f0373259700000000000000"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe8e04ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:03 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000)=0x800000, 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$incfs(r1, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0x40106726, 0x20000000) 23:21:03 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:03 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:03 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef52cf3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:04 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x118, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1000}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x9}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x2}}]}, 0x118}, 0x1, 0x0, 0x0, 0x804}, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:04 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0x40106726, 0x20000000) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x0) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0x40106726, 0x20000000) 23:21:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3b0717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:04 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x800000, 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0x40106726, 0x20000000) 23:21:04 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x0) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0x40106726, 0x20000000) 23:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x10921, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) sendmsg$DEVLINK_CMD_PORT_SPLIT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, 0x0, 0x1, 0x70bd29, 0x25dfdbfd, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x7}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x48000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f00000007c0)=""/250, 0xfa}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f00000059c0)=""/102400, 0x19000}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f0000000280)=""/83, 0x53}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000000300)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}, {{&(0x7f0000000400)=@ieee802154, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000600)=""/130, 0x82}, 0x8}], 0x4, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x800000, 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c59436b5df23c900f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:04 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x0) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0x40106726, 0x20000000) 23:21:04 executing program 5: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e12901dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe8104ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 5: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0x40106726, 0x20000000) 23:21:04 executing program 5: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8}}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x20008000) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:04 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 0: r0 = clone3(&(0x7f0000000380)={0x40040000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x22}, &(0x7f0000000280)=""/143, 0x8f, &(0x7f0000000140)=""/127, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0xffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r2 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r3 = dup(r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r2, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}, {&(0x7f0000000580)=""/227, 0xe3}, {&(0x7f0000000780)=""/87, 0x57}], 0x8, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r3, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5e01dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:04 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382060085da1ed19529cdc9e9d4928cccd34442e36280672af07311f46e7f2ea43941bd65bb0dda770b07008a657ae8944a3dc71adc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe91262cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x80, 0x8, 0x7, 0x40, 0x0, 0x7f, 0x200, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7ff, 0x5, @perf_config_ext={0x0, 0x6}, 0x200, 0x200, 0x9, 0x4, 0x80000001, 0x40, 0x3, 0x0, 0x5}, 0x0, 0x7, r0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:04 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x0) 23:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e382c23f85da1ed19529cdc9e9d4928cccd36280672af0a43941bd65bb0dda770bb8678a657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d38586685412b60a5f50cc3c013497cd099111b154c49720201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2b632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e1e042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978fa9280e28e461a05d0c4e0a185a591"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:04 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4bfdb90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x0) 23:21:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:04 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2321242e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a27a060f95cf7203732597492a855630b33f94c92455b0af33ad0aeb1954fb0f5c9426e5fe109b9fe5a333d28cd29870a400fb786ea7af9b3622516443cf44f81b71050a58bee8a08bec96a63d769e0cb3649d3c9f6ef7cf633804e68fefab9e55a2b3ec34d6eba630e17342c41a00c60246cd1881b2ac79eb63b8448644dc9bb955"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:04 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x0) 23:21:04 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:04 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:04 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db9feea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:05 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:05 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x0) 23:21:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0x40106726, 0x20000000) 23:21:05 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) [ 451.632213][T12276] incfs: Backing dir is not set, filesystem can't be mounted. 23:21:05 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x0) 23:21:05 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232eda5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:05 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) [ 451.681235][T12288] incfs: Backing dir is not set, filesystem can't be mounted. 23:21:05 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x0) [ 451.751895][T12296] incfs: Backing dir is not set, filesystem can't be mounted. 23:21:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a02b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:05 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x29, 0x9, 0x2, 0x4, 0x4, @dev={0xfe, 0x80, '\x00', 0x1f}, @local, 0x80, 0x7800, 0x3f, 0x4}}) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000003a80)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/79, 0x4f}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/210, 0xd2}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}, {{&(0x7f0000000140)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)=""/152, 0x98}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000340)=""/17, 0x11}], 0x3}, 0xbf3}, {{&(0x7f00000003c0)=@xdp, 0x80, &(0x7f00000038c0)=[{&(0x7f0000001600)=""/237, 0xed}, {&(0x7f0000001700)=""/130, 0x82}, {&(0x7f0000000440)}, {&(0x7f00000017c0)=""/170, 0xaa}, {&(0x7f0000001880)=""/4, 0x4}, {&(0x7f00000018c0)=""/4093, 0xffd}, {&(0x7f00000028c0)=""/4096, 0x1000}], 0x7}, 0x3ff}], 0x5, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:05 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:05 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x3, 0x4, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="232e7bdc482f20202f5c202921200a0008821d8c46dae91c5943eb73a07a060f95cf7203732597492a8556302463a69248b65cdf6b3d1dc44689923cedbe3f1f719607d65eafc2378b62266385a68dac06b120af7e402221df603b8c0cf0dccb8e0713441cfd3107d32001000080000000002a1556d502305701fa3e7df44dd9fd1d6d4ac3c2c11d341b3eba27937b53cb7e920b6aa0169b85"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x4, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f00000000c0)={0x2, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x7}, 0x7) 23:21:05 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$incfs(r4, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0x40106726, 0x20000000) 23:21:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:05 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000000)=0x800000, 0x12) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="2dbfa3568ebc81ce42a487b259267065aa17e1020b9cda876b8bf4c7419cff53c7c265ff8d0c", 0x26}, {&(0x7f00000003c0)="efd6aecc85f6d908878f2ee0c92ea9d5a87aa174f52700c2762c1d76b4c4af72efae424de616523b65c4b3b705b822c9a4687b0a154dacca1c2ebad80821f4c04aeda2d42e2cd99bbd21ebdab42509b4023b00b951778b68eda72922ac6b7c78443dce77649ee5d9a7774781e4dce1c1f257deeae1e82cb9a0fa2c0f72a9b9eea14aaeba56db54fd7993a38060ccd21731c07be908c7a906aa9351d9f01754dfa2107380efa2c1b80aa7dd01696402c25d169f578efdfc1cb07f0d882947d74bb7a913d2f59a9e0da5feae2ba6b25d12ae6b285d3345", 0xd6}], 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000500)=0x6) sendfile(r2, r0, 0x0, 0x8000200000004) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x40, 0xbf, 0xcf, 0x0, 0x1ffc000000000000, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x805, 0x4, 0x401, 0x9, 0x6, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$incfs(r6, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0x40106726, 0x20000000) 23:21:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a03b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:05 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000000340)=""/118, 0x66}, {&(0x7f00000002c0)=""/76, 0xfffffffffffffd27}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x80000001}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x10000350, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x40012102, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@dev, @in6=@loopback}}, {{@in=@private}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:05 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) (fail_nth: 1) 23:21:05 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) (fail_nth: 1) 23:21:05 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) (fail_nth: 1) 23:21:05 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f00000059c0)=""/102400, 0x19000}, {&(0x7f0000005340)=""/216, 0xd8}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f0000000440)=""/94, 0x5e}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x447}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000004c0)=""/79, 0x4f}, {&(0x7f00000000c0)=""/48, 0x30}, {&(0x7f0000000540)=""/196, 0xc4}, {&(0x7f0000000640)=""/122, 0x7a}], 0x4, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="2de2000000"], 0x14}, 0x1, 0x0, 0x0, 0x2004005d}, 0x80) 23:21:05 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x2, 0x20000000) 23:21:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a04b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:05 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x2, 0x20000000) 23:21:05 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x2, 0x20000000) 23:21:05 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(r0, &(0x7f0000005300)=ANY=[], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='*.+)},:,$\x00', &(0x7f0000000100)='@\x00', &(0x7f0000000140)='-\b(]}/\x90(*\x00', &(0x7f0000000180)='\\*.${}\xda-,^#+\x00'], &(0x7f0000000640)=[&(0x7f00000002c0)=']\xa4*^\'/(\\\xc0\x00', &(0x7f0000000300)='^]\x00', &(0x7f0000000340)=']\f-\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='@\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='::\x00', &(0x7f0000000600)='#\xac(O\x00']) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:05 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x4b47, 0x20000000) 23:21:05 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x4b47, 0x20000000) 23:21:05 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x4b47, 0x20000000) 23:21:05 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x4b49, 0x20000000) 23:21:05 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x4b49, 0x20000000) 23:21:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a05b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:05 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x4b49, 0x20000000) 23:21:05 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x541b, 0x20000000) 23:21:05 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x541b, 0x20000000) 23:21:05 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:05 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x49, 0x66766, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x54, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0xffff, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_NOACK_MAP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x144000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000226bd7000fbdbdf2557000000080003008bc4ef60a222db5138052c8d9507ac6b95ad7991dbff05d1d4b475348b2cd43672997eda5106df45bb7b2dc5796a8ac8d05827db08bddf6261f94054c7cb535c98f8bcc2145d4a14a8ae544023746187c77448ac107612cb493cdd855a305793f4799e677897438b492c2f936983170974ba100dc6895161f3bebe541e0a4c8afd36689909f9084bbc345e03bb8a", @ANYRES32=0x0, @ANYBLOB="06009500b70000000600950001000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8011) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000000600)=""/231, 0xe7}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f0000000300)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0xfe}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/197, 0xc5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:05 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x541b, 0x20000000) 23:21:05 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5421, 0x20000000) 23:21:05 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5421, 0x20000000) 23:21:05 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e1e, 0x5, @dev={0xfe, 0x80, '\x00', 0x18}}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:05 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5421, 0x20000000) 23:21:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a06b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:06 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0x40106726, 0x20000000) 23:21:06 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5450, 0x20000000) 23:21:06 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5450, 0x20000000) 23:21:06 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/232, 0xe8}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f00000059c0)=""/102400, 0x19000}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000280)=@dstopts={0x2c, 0x1c, '\x00', [@pad1, @jumbo={0xc2, 0x4, 0x6}, @generic={0x81, 0xd6, "c576947c77af922e99be18a00025f953950e4d1de12b431566c423474e94bdf8ab5e563a55f40fa9221c99b0661ad93aac7fdc4523353ab63a92f7fabef1cc11302c23a99c24fd52a5a2b75293e37b1a301370f535e49f22f26b5429a09969a4d690c2c9f7c4f9c59562daee1cfa8aeabcb30766258372cbaec47d8f96bbf0d90da941d3a4394080e7e8bc234fdc9cb88b28acf61f5257fd8cf63aba9580a95168682b7316aa0672c689fd11553ff436bfc4fd22ebb179d4868a259162f12f3288376e4b338ccbe091a580f22595df0546c8830a65e3"}]}, 0xf0) 23:21:06 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5450, 0x20000000) 23:21:06 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0x40106726, 0x20000000) 23:21:06 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5451, 0x20000000) 23:21:06 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5451, 0x20000000) 23:21:06 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup(0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:06 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5451, 0x20000000) 23:21:06 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0x40106726, 0x20000000) 23:21:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a07b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:06 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5452, 0x20000000) 23:21:06 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5452, 0x20000000) 23:21:06 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5452, 0x20000000) 23:21:06 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:06 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYRES16, @ANYRESOCT], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022abd7000fbdbdf2507000000088001003f0400000800030025129f1dc448598ad0e49d0100000020c86f78083f19116be246a05c07cd026369503fb02c369e2722409f35022977a30faa6d2d65dc567bbbe2852ebc71745c7592181cb1c85bb44f17d637deaf680807c948954c897df8", @ANYRES32=0x0, @ANYBLOB="08000500010000000a0018000303030303030000"], 0x38}}, 0x4040040) recvmmsg(r0, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:06 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, 0x0, 0x4, 0xffff, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008000}, 0x91) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:06 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5460, 0x20000000) 23:21:06 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:06 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5460, 0x20000000) 23:21:06 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x5460, 0x20000000) 23:21:06 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x20000000) 23:21:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a08b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:06 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40046721, 0x20000000) 23:21:06 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) 23:21:06 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40046721, 0x20000000) 23:21:06 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40046721, 0x20000000) 23:21:06 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f66696c01040000000000005c402f20202f5c202921200a5708821d8c46dae91c59431236a07a060f95cf7203732597492a855630b3db623c8e3f94c992af99144e7cf8c07b87fd046f144fbab0c07ce6ac9780aeb1264d65c52e175124e8ce9d6c734b215189764ca554ae89736b456eac3ba0c7e1f9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x4c, 0x0, 0x822, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}]}, 0x4c}, 0x1, 0x0, 0x0, 0x804}, 0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)={0x118, 0x0, 0xa04, 0x70bd26, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}]}, 0x118}, 0x1, 0x0, 0x0, 0x20068090}, 0x20000014) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1012e35a3d27ef0a0c3d8ca04d3075a7f133c49716079c3e0c1be9e28279a2702dfe66d41f2f4bc6231ae4d0d67fccb8cc565ebe020fb2e38221c23f85da1ed19529cdc9e9d4928cccd36280657ae8944a3dc71bdc6823ce3a2d8c7c611e604c4889105ab513c353d90f310a08d3858668cb5412b60a5f50cc3c013497cd099111b154c4ffff201405f7d5739b48f910c5c4f9434d1741f19f4268294497192fc33f50b11947790d9839387d5c3ed13d2cd89bd55e51cc99a21fdf5a11182090f2f2a632f72d6add266140fda76a03a747703899bf9cfdb8326788d0db7d255fec53fb2bcfe14a91d54c6dd29fe543bb4c7fcf1d4e03042d4baed0a0649252935ec223d90f284cfca33e7a07a08125594a369d30636a68d75cb743c34bb6000464fd7d41fe0c532cb85f82d7360259441c4d878e4978da9280e28e461a05d0c4e0a185a59144a8c84cc208e1b179f8800f1c1abe03fd2d1ebbc8d04175330058a050e4f8743225c534c632"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:06 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) [ 453.019781][T12492] kasan: CONFIG_KASAN_INLINE enabled [ 453.027636][T12494] kasan: CONFIG_KASAN_INLINE enabled [ 453.033594][T12496] kasan: CONFIG_KASAN_INLINE enabled [ 453.041121][T12492] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 453.049801][T12494] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 453.051453][T12496] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 453.067643][T12494] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 453.074578][T12494] CPU: 0 PID: 12494 Comm: syz-executor.3 Not tainted 5.4.147-syzkaller-00003-gb9c4f1b9b54a #0 [ 453.084788][T12494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.094877][T12494] RIP: 0010:pending_reads_dispatch_ioctl+0x855/0x29e0 [ 453.101604][T12494] Code: 41 a4 85 ff 49 c7 c7 f9 ff ff ff 48 8b 5c 24 38 e9 e7 07 00 00 49 8d 5e 28 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 df e8 7d c0 b2 ff 48 c7 c0 00 33 dd 84 48 [ 453.121183][T12494] RSP: 0018:ffff88819c437cf8 EFLAGS: 00010206 [ 453.127256][T12494] RAX: 0000000000000005 RBX: 0000000000000028 RCX: dffffc0000000000 [ 453.135203][T12494] RDX: ffffc9000da6e000 RSI: 000000000000001b RDI: 000000000000001c [ 453.143144][T12494] RBP: 0000000000000000 R08: ffffffff8198ec96 R09: ffffed1033886fb3 [ 453.151097][T12494] R10: ffffed1033886fb3 R11: 0000000000000000 R12: 0000000040046721 [ 453.159034][T12494] R13: ffff8881a04041a0 R14: 0000000000000000 R15: 1ffff11034080834 [ 453.166993][T12494] FS: 00007f11d9e0f700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 453.175884][T12494] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 453.182434][T12494] CR2: 00007ffb1e985058 CR3: 0000000187da1000 CR4: 00000000003406f0 [ 453.190378][T12494] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 453.198453][T12494] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 453.206399][T12494] Call Trace: [ 453.209679][T12494] ? pending_reads_poll+0x160/0x160 [ 453.214855][T12494] do_vfs_ioctl+0x6fb/0x15b0 [ 453.219418][T12494] __x64_sys_ioctl+0xd4/0x110 [ 453.224066][T12494] do_syscall_64+0xcb/0x1e0 [ 453.228589][T12494] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 453.234475][T12494] RIP: 0033:0x7f11dc098ae9 [ 453.238862][T12494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 453.258438][T12494] RSP: 002b:00007f11d9e0f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 453.266813][T12494] RAX: ffffffffffffffda RBX: 00007f11dc1abf60 RCX: 00007f11dc098ae9 [ 453.274749][T12494] RDX: 0000000020000000 RSI: 0000000040046721 RDI: 0000000000000004 [ 453.282688][T12494] RBP: 00007f11dc0f2f6d R08: 0000000000000000 R09: 0000000000000000 [ 453.290627][T12494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 453.298565][T12494] R13: 00007ffc3e229f4f R14: 00007f11d9e0f300 R15: 0000000000022000 [ 453.306508][T12494] Modules linked in: [ 453.310414][T12496] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 453.317342][T12496] CPU: 1 PID: 12496 Comm: syz-executor.1 Tainted: G D 5.4.147-syzkaller-00003-gb9c4f1b9b54a #0 [ 453.328942][T12496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.338979][T12496] RIP: 0010:pending_reads_dispatch_ioctl+0x855/0x29e0 [ 453.345708][T12496] Code: 41 a4 85 ff 49 c7 c7 f9 ff ff ff 48 8b 5c 24 38 e9 e7 07 00 00 49 8d 5e 28 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 df e8 7d c0 b2 ff 48 c7 c0 00 33 dd 84 48 [ 453.365275][T12496] RSP: 0018:ffff88819b5ffcf8 EFLAGS: 00010206 [ 453.371310][T12496] RAX: 0000000000000005 RBX: 0000000000000028 RCX: dffffc0000000000 [ 453.379247][T12496] RDX: ffffc90000a98000 RSI: 000000000000001e RDI: 000000000000001f [ 453.387624][T12496] RBP: 0000000000000000 R08: ffffffff8198ec96 R09: ffffed10336bffb3 [ 453.395563][T12496] R10: ffffed10336bffb3 R11: 0000000000000000 R12: 0000000040046721 [ 453.403501][T12496] R13: ffff8881a04044a0 R14: 0000000000000000 R15: 1ffff11034080894 [ 453.411467][T12496] FS: 00007f8b21092700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 453.420367][T12496] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 453.426927][T12496] CR2: 00007f34d06bd718 CR3: 00000001e5971000 CR4: 00000000003406e0 [ 453.434871][T12496] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 453.442815][T12496] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 453.450774][T12496] Call Trace: [ 453.454050][T12496] ? pending_reads_poll+0x160/0x160 [ 453.459227][T12496] do_vfs_ioctl+0x6fb/0x15b0 [ 453.463788][T12496] __x64_sys_ioctl+0xd4/0x110 [ 453.468433][T12496] do_syscall_64+0xcb/0x1e0 [ 453.472908][T12496] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 453.478774][T12496] RIP: 0033:0x7f8b2331bae9 [ 453.483168][T12496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 453.502825][T12496] RSP: 002b:00007f8b21092188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 453.511209][T12496] RAX: ffffffffffffffda RBX: 00007f8b2342ef60 RCX: 00007f8b2331bae9 [ 453.519350][T12496] RDX: 0000000020000000 RSI: 0000000040046721 RDI: 0000000000000004 [ 453.527288][T12496] RBP: 00007f8b23375f6d R08: 0000000000000000 R09: 0000000000000000 [ 453.535239][T12496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 453.543176][T12496] R13: 00007fff55b7410f R14: 00007f8b21092300 R15: 0000000000022000 [ 453.551114][T12496] Modules linked in: [ 453.555035][T12492] general protection fault: 0000 [#3] PREEMPT SMP KASAN [ 453.561966][T12492] CPU: 0 PID: 12492 Comm: syz-executor.4 Tainted: G D 5.4.147-syzkaller-00003-gb9c4f1b9b54a #0 [ 453.572394][T12496] ---[ end trace f7f4a1f085c9749e ]--- [ 453.573588][T12492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.573606][T12492] RIP: 0010:pending_reads_dispatch_ioctl+0x855/0x29e0 [ 453.573615][T12492] Code: 41 a4 85 ff 49 c7 c7 f9 ff ff ff 48 8b 5c 24 38 e9 e7 07 00 00 49 8d 5e 28 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 df e8 7d c0 b2 ff 48 c7 c0 00 33 dd 84 48 [ 453.573619][T12492] RSP: 0018:ffff8881e44bfcf8 EFLAGS: 00010206 [ 453.579140][T12496] RIP: 0010:pending_reads_dispatch_ioctl+0x855/0x29e0 [ 453.589085][T12492] RAX: 0000000000000005 RBX: 0000000000000028 RCX: dffffc0000000000 [ 453.589091][T12492] RDX: ffffc90001b05000 RSI: 000000000000001e RDI: 000000000000001f [ 453.589095][T12492] RBP: 0000000000000000 R08: ffffffff8198ec96 R09: ffffed103c897fb3 [ 453.589099][T12492] R10: ffffed103c897fb3 R11: 0000000000000000 R12: 0000000040046721 [ 453.589103][T12492] R13: ffff8881a0405520 R14: 0000000000000000 R15: 1ffff11034080aa4 [ 453.589110][T12492] FS: 00007f4257193700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 453.589115][T12492] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 453.589125][T12492] CR2: 00007ffde016a798 CR3: 00000001dece6000 CR4: 00000000003406f0 [ 453.596390][T12496] Code: 41 a4 85 ff 49 c7 c7 f9 ff ff ff 48 8b 5c 24 38 e9 e7 07 00 00 49 8d 5e 28 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 df e8 7d c0 b2 ff 48 c7 c0 00 33 dd 84 48 [ 453.615768][T12492] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 23:21:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a09b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 23:21:07 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x40106726, 0x20000000) [ 453.615773][T12492] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 453.615776][T12492] Call Trace: [ 453.615795][T12492] ? pending_reads_poll+0x160/0x160 [ 453.615811][T12492] do_vfs_ioctl+0x6fb/0x15b0 [ 453.621899][T12496] RSP: 0018:ffff88819c437cf8 EFLAGS: 00010206 [ 453.628586][T12492] __x64_sys_ioctl+0xd4/0x110 [ 453.628595][T12492] do_syscall_64+0xcb/0x1e0 [ 453.628605][T12492] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 453.628617][T12492] RIP: 0033:0x7f425941cae9 [ 453.636633][T12496] RAX: 0000000000000005 RBX: 0000000000000028 RCX: dffffc0000000000 [ 453.644512][T12492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 453.644517][T12492] RSP: 002b:00007f4257193188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 453.644524][T12492] RAX: ffffffffffffffda RBX: 00007f425952ff60 RCX: 00007f425941cae9 [ 453.644529][T12492] RDX: 0000000020000000 RSI: 0000000040046721 RDI: 0000000000000004 23:21:07 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921200a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x16c, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x4}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x4000010}, 0x48040) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) 23:21:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a0ab7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) [ 453.644539][T12492] RBP: 00007f4259476f6d R08: 0000000000000000 R09: 0000000000000000 [ 453.652699][T12496] RDX: ffffc9000da6e000 RSI: 000000000000001b RDI: 000000000000001c [ 453.660592][T12492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 453.660596][T12492] R13: 00007fffa012a48f R14: 00007f4257193300 R15: 0000000000022000 [ 453.660602][T12492] Modules linked in: [ 453.857665][T12496] RBP: 0000000000000000 R08: ffffffff8198ec96 R09: ffffed1033886fb3 23:21:07 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) write$binfmt_script(0xffffffffffffffff, &(0x7f0000005300)=ANY=[@ANYBLOB="2321202e2f66696c653020205b232e7b5c402f20202f5c202921201a5708821d8c46dae91c5943eb73a07a060f95cf7203732597492a855630b33f94c9"], 0x3d) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x17) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xcf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000080)=0x800, 0x80000001) write$binfmt_script(0xffffffffffffffff, 0x0, 0xbb) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005180)=""/235, 0xeb}, {&(0x7f0000005280)=""/117, 0x75}, {&(0x7f0000005300)}, {&(0x7f0000005340)=""/229, 0xe5}, {&(0x7f0000005440)=""/102, 0x66}, {&(0x7f00000054c0)=""/81, 0x51}], 0x6, &(0x7f00000055c0)=""/85, 0x55}, 0x100}, {{&(0x7f0000005640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)=""/57, 0x39}, {&(0x7f0000005700)=""/213, 0xd5}], 0x2, &(0x7f0000005840)=""/158, 0x9e}, 0xffffff81}], 0x3, 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) [ 453.865994][T12496] R10: ffffed1033886fb3 R11: 0000000000000000 R12: 0000000040046721 [ 453.874672][T12496] R13: ffff8881a04041a0 R14: 0000000000000000 R15: 1ffff11034080834 [ 453.886527][T12496] FS: 00007f8b21092700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 453.889082][T12492] ---[ end trace f7f4a1f085c9749f ]--- [ 453.903280][T12496] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 453.909251][T12492] RIP: 0010:pending_reads_dispatch_ioctl+0x855/0x29e0 23:21:07 executing program 5: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) unshare(0x40400) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$incfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x40106726, 0x0) [ 453.919450][T12492] Code: 41 a4 85 ff 49 c7 c7 f9 ff ff ff 48 8b 5c 24 38 e9 e7 07 00 00 49 8d 5e 28 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 df e8 7d c0 b2 ff 48 c7 c0 00 33 dd 84 48 [ 453.924993][T12496] CR2: 00007fe687d65004 CR3: 00000001e5971000 CR4: 00000000003406e0 [ 453.940026][T12494] ---[ end trace f7f4a1f085c974a0 ]--- [ 453.958956][T12494] RIP: 0010:pending_reads_dispatch_ioctl+0x855/0x29e0 [ 453.966226][T12492] RSP: 0018:ffff88819c437cf8 EFLAGS: 00010206 [ 453.972373][T12492] RAX: 0000000000000005 RBX: 0000000000000028 RCX: dffffc0000000000 [ 453.980462][T12494] Code: 41 a4 85 ff 49 c7 c7 f9 ff ff ff 48 8b 5c 24 38 e9 e7 07 00 00 49 8d 5e 28 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 df e8 7d c0 b2 ff 48 c7 c0 00 33 dd 84 48 [ 453.998077][T12496] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 454.003705][T12492] RDX: ffffc9000da6e000 RSI: 000000000000001b RDI: 000000000000001c [ 454.009668][T12494] RSP: 0018:ffff88819c437cf8 EFLAGS: 00010206 [ 454.022209][T12496] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 454.025242][T12492] RBP: 0000000000000000 R08: ffffffff8198ec96 R09: ffffed1033886fb3 [ 454.030606][T12494] RAX: 0000000000000005 RBX: 0000000000000028 RCX: dffffc0000000000 [ 454.045793][T12492] R10: ffffed1033886fb3 R11: 0000000000000000 R12: 0000000040046721 [ 454.046839][T12496] Kernel panic - not syncing: Fatal exception [ 454.054163][T12492] R13: ffff8881a04041a0 R14: 0000000000000000 R15: 1ffff11034080834 [ 454.060387][T12496] Kernel Offset: disabled [ 454.072759][T12496] Rebooting in 86400 seconds..