d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478b", 0x12c}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2136.079795][T25720] loop3: detected capacity change from 0 to 131456 15:38:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2136.150031][T25720] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:38:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:05 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478b", 0x12c}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='M', 0x1}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2139.108659][ T22] kauditd_printk_skb: 149 callbacks suppressed [ 2139.108673][ T22] audit: type=1326 audit(1633448285.580:84850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25756 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2139.130426][T25768] loop3: detected capacity change from 0 to 131456 15:38:05 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2139.173789][T25768] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2139.182035][ T22] audit: type=1326 audit(1633448285.610:84851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25756 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2139.245501][ T22] audit: type=1326 audit(1633448285.610:84852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25756 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2139.271316][ T22] audit: type=1326 audit(1633448285.610:84853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25756 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2139.296389][ T22] audit: type=1326 audit(1633448285.610:84854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25756 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2139.321179][ T22] audit: type=1326 audit(1633448285.610:84855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25756 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2139.335194][T25796] loop3: detected capacity change from 0 to 131456 [ 2139.348841][ T22] audit: type=1326 audit(1633448285.610:84856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25771 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2139.356625][T25796] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2139.381250][ T22] audit: type=1326 audit(1633448285.610:84857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25771 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2139.409377][ T22] audit: type=1326 audit(1633448285.610:84858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25771 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2139.434194][ T22] audit: type=1326 audit(1633448285.610:84859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25771 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 15:38:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:08 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='M', 0x1}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478b", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:08 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478b", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='M', 0x1}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2142.160207][T25820] loop3: detected capacity change from 0 to 131456 15:38:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2142.217796][T25820] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:38:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4a425d4584382dba8e92c7c9f94d85d363008711ea8e636d69efa98d0e709c3e722000012db13", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2145.171853][T25863] loop3: detected capacity change from 0 to 131456 [ 2145.181744][ T22] kauditd_printk_skb: 148 callbacks suppressed [ 2145.181758][ T22] audit: type=1326 audit(1633448291.651:85008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25860 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 15:38:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4a425d4584382dba8e92c7c9f94d85d363008711ea8e636d69efa98d0e709c3e722000012db13", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(0x0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2145.311518][ T22] audit: type=1326 audit(1633448291.651:85009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25860 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2145.338378][ T22] audit: type=1326 audit(1633448291.691:85011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25860 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2145.345960][T25863] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 2145.363111][ T22] audit: type=1326 audit(1633448291.691:85010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25859 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2145.398789][ T22] audit: type=1326 audit(1633448291.691:85012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25860 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2145.423485][ T22] audit: type=1326 audit(1633448291.691:85013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25860 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 15:38:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2145.448302][ T22] audit: type=1326 audit(1633448291.691:85014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25860 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2145.477028][ T22] audit: type=1326 audit(1633448291.691:85015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25860 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2145.505651][ T22] audit: type=1326 audit(1633448291.691:85016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25860 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2145.541129][ T22] audit: type=1326 audit(1633448291.691:85017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25860 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 15:38:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:14 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:14 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(0x0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:14 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2148.222252][T25932] loop3: detected capacity change from 0 to 131456 15:38:14 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(0x0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(0x0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) [ 2148.263316][T25932] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 15:38:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) 15:38:14 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478b", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(0x0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:17 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(0x0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) 15:38:17 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) [ 2151.250177][ T22] kauditd_printk_skb: 145 callbacks suppressed [ 2151.250189][ T22] audit: type=1326 audit(1633448297.721:85163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25974 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2151.288922][T25980] loop3: detected capacity change from 0 to 131456 15:38:17 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='M', 0x1}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:17 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb7f9a8b34", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) [ 2151.318844][T25980] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:38:17 executing program 5: socketpair(0x10, 0x2, 0x800, 0x0) [ 2151.378047][ T22] audit: type=1326 audit(1633448297.761:85164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25974 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 15:38:17 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='M', 0x1}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2151.407103][ T22] audit: type=1326 audit(1633448297.761:85165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25974 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 15:38:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007940)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)='\b', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}], 0x2}}], 0x2, 0x0) [ 2151.467718][ T22] audit: type=1326 audit(1633448297.761:85166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25974 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2151.493162][T26025] loop3: detected capacity change from 0 to 131456 [ 2151.495659][ T22] audit: type=1326 audit(1633448297.761:85167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25974 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2151.538119][T26025] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:38:18 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='M', 0x1}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:18 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f0000000000)="ed", 0x1) 15:38:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef0100", 0x3c, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) [ 2151.540734][ T22] audit: type=1326 audit(1633448297.761:85168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25974 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2151.586170][ T22] audit: type=1326 audit(1633448297.771:85169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25987 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2151.617981][ T22] audit: type=1326 audit(1633448297.771:85170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25987 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 15:38:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}], 0x20}, 0x0) 15:38:18 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2151.651136][ T22] audit: type=1326 audit(1633448297.771:85171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25987 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2151.658587][T26044] loop3: detected capacity change from 0 to 131456 [ 2151.683558][ T22] audit: type=1326 audit(1633448297.771:85172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25987 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 15:38:18 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb7f9a8b34", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2151.780817][T26044] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 15:38:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000001d80)={0x0, 0x0, &(0x7f0000001cc0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 15:38:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:20 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:20 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:20 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000002680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=ANY=[@ANYBLOB="1c000000b3"], 0xa0}}], 0x1, 0x0) 15:38:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:20 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:20 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2154.435972][T26083] loop3: detected capacity change from 0 to 131456 15:38:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 15:38:21 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2154.516519][T26083] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2154.566596][T26083] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 15:38:23 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:23 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2, 0x4e22, @local}, 0x10, 0x0}, 0x50) 15:38:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) [ 2157.432879][T26130] loop3: detected capacity change from 0 to 131456 [ 2157.450633][T26130] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:38:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007940)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)='\b', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}], 0x2, &(0x7f00000028c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}], 0x20}}], 0x2, 0x0) 15:38:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) [ 2157.478525][ T22] kauditd_printk_skb: 183 callbacks suppressed [ 2157.478539][ T22] audit: type=1326 audit(1633448303.952:85356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26131 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 15:38:24 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2157.539366][ T22] audit: type=1326 audit(1633448303.992:85357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26131 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 15:38:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00'}) [ 2157.564965][ T22] audit: type=1326 audit(1633448303.992:85358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26131 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2157.619089][ T22] audit: type=1326 audit(1633448303.992:85359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26131 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2157.644949][ T22] audit: type=1326 audit(1633448303.992:85360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26128 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2157.674016][T26162] loop3: detected capacity change from 0 to 131456 [ 2157.688485][ T22] audit: type=1326 audit(1633448303.992:85361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26131 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2157.717288][ T22] audit: type=1326 audit(1633448303.992:85362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26131 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2157.743558][ T22] audit: type=1326 audit(1633448303.992:85363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26131 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2157.771603][ T22] audit: type=1326 audit(1633448303.992:85364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26128 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2157.778511][T26162] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2157.797288][ T22] audit: type=1326 audit(1633448303.992:85365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26128 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 15:38:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478b", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:26 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) 15:38:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x2c}}, 0x0) 15:38:26 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:26 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2160.453897][T26191] loop3: detected capacity change from 0 to 131456 [ 2160.492686][T26191] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:38:27 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) 15:38:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478b", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:27 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, 0x0) 15:38:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:27 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb7f9a8b34", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:27 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) 15:38:27 executing program 5: socket(0x2, 0x0, 0xfffffffa) [ 2160.611902][T26226] loop3: detected capacity change from 0 to 131456 [ 2160.638866][T26226] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:38:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="00000000000002005250"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:29 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @multicast1}}}], 0x20}, 0x0) 15:38:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f000000a900)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000015c0)=ANY=[@ANYBLOB="140000000000000001000000", @ANYRES32=r0, @ANYBLOB="000000001c0000000000000001"], 0x88}}], 0x1, 0x0) [ 2163.515119][ T22] kauditd_printk_skb: 154 callbacks suppressed [ 2163.515135][ T22] audit: type=1326 audit(1633448309.982:85520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26243 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2163.550091][T26255] loop3: detected capacity change from 0 to 131456 15:38:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000000), 0x4) 15:38:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478b", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000001500)={{0x2, 0x0, @remote}, {0x0, @multicast}, 0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'ipvlan1\x00'}) 15:38:30 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2163.578738][ T22] audit: type=1326 audit(1633448310.012:85521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26245 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 15:38:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478b", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2163.643073][T26255] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2163.662541][ T22] audit: type=1326 audit(1633448310.012:85522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26245 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 15:38:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) [ 2163.687542][ T22] audit: type=1326 audit(1633448310.012:85523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26245 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2163.713683][ T22] audit: type=1326 audit(1633448310.012:85524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26245 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2163.740486][ T22] audit: type=1326 audit(1633448310.012:85525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26245 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2163.765933][ T22] audit: type=1326 audit(1633448310.012:85526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26245 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2163.790939][ T22] audit: type=1326 audit(1633448310.012:85527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26243 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2163.817819][ T22] audit: type=1326 audit(1633448310.012:85528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26243 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2163.824782][T26288] loop3: detected capacity change from 0 to 131456 [ 2163.846508][ T22] audit: type=1326 audit(1633448310.012:85529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26243 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2163.894964][T26288] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:38:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="00000000000002005250"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000004a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2002, 0x0) 15:38:32 executing program 5: getresuid(&(0x7f00000074c0), &(0x7f0000007500), 0x0) 15:38:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) sendmmsg$inet(r1, &(0x7f0000001b00)=[{{&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000180)={0x2, 0x4e24, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x83}]}}}], 0x18}}], 0x2, 0x0) 15:38:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) sendmmsg$inet(r1, &(0x7f0000001b00)=[{{&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x2, 0x0) [ 2166.551385][T26306] loop3: detected capacity change from 0 to 131456 [ 2166.584255][T26306] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:38:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:33 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000080)={@remote}, 0x14) 15:38:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) [ 2166.734952][T26340] loop3: detected capacity change from 0 to 131456 [ 2166.745521][T26340] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:38:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:36 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="00000000000002005250"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={0x0}}, 0x0) 15:38:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) 15:38:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000280)={0xa, 0x4e21, 0x0, @dev}, 0x1c, &(0x7f00000005c0)=[{&(0x7f00000002c0)="eaa27c8c676a64a1eabb8dec33489b6c91b3c3c0b1504f085a49fd7729a47bc80fe65f6885237466612ed363ff0fc8fc5cbc6ddbcf9b3c8d7b0a1fbdce112fdb9b4ffed0af357f9209f98736e99b185dcfa05748", 0x54}, {&(0x7f0000000340)="5c42251e91a5eb3a412dcd40d9552f16ec0b74d9add324121577a818f89cd4e1f54e6100d8b38cb7336846d6ab2dc10e9837824cc2779d325e8b201d6555a7d934922307e8a82fb1422a2d22d14341f660e0c665e7eb551d2da321b265cd8ef0a3", 0x61}, {&(0x7f0000000740)="36428edf948755b9d97cb7c31cc347fedcf6aff34beadaae014bbbc5a7f10b0e74966038eab685d63f0e5222041b7114788df182d24d5f36fd1646210467ea24c8775f826323ed732cfdfc651db93f64335bc8c404a39954d4a4d5deee3088653d4f3bea48382fa77d587f975fc6f641c2f465c521118f1ad55da7ccf9d00c1db31955fd8a29fcaba0cd4379ca5ed132fb35913414f228d021971649f1e08bc9b9d0b6e57e9f77f58dbeccb1d577e9b54b892a267375009c8c3c8e23ab33133a1f17218e478b83f60315b9a15ed85d8698ead3b64276090c45f0508da4ea6cc57de537b6b83e6c77e792a8335430d5091a8808c38fb2119f171be297f20ebd8cb3f7d2692b1f0d7f0d5aa0d36934c9969bdaa0977b9dd37cfc68e7abf547ad0ea67a2a322468272899a0efedb1fd54c97a6c89ea9e34a7fff49de17a89ceccaaffd61929dcb8b1bb511cec74ff43790290ada7f833f152c7c40773ce5ae61254e34141615dce8f6675990da969c5f3d54948b613e82de840fc0379d421fc89f152dcd12f11a4c9ac4249900ca9a15d3ea6d878e3f14eaa7986ea27eb8ea68055b1141de51eb66eb4378bfbb734ad6d78fd016c2377316237a6de0ed40b1e7560dfef04f33559d56922afb1f485d90676392edf1eea03f95ec69f52461d69f71b54a91aaf529274d9bc7b6fe3969e72a3af18fe95865895b407d3f40576794f67ae05c249f05df3eaf44732cfa266e76b60d80ae8e1d338051be23c9622cb34a14a2891d4ffc1737eaabe7780e27793708643ac89bd45868c7d40792480d4053c72aa1dcc15cb5679433693415b4f34b49555f346ccfe6a1688e00d8fc506c5b0451e8c3b7f89ab2c447ccb9092a1e5ee4a93348d4b387c91b2315eb59a75d3676baa80a0ca6d03284f4e257df09210027e445fa37d71dbc6c2896b947493c626b5065bdc07dec2d676825044a5cd0bb4b07ad82189b80b43580d6ae9e7bc12aac739ebb45ba6d9df9025766d9b025f385545b52604c574aac6c97baac592f7ba908e2b6a48e6af992b09181da5ee9cf350e6dd2fa17a629670d2c561c322682c7465fd7c34fe4e2373d384ca7d602f9bf1d92c36bff1fa7f27836bde03b5a006828266527364ca3b1bd4839a6e7f51cc8c1ddfd44a09cdb96ffa4b1b6b4f3c1055befa64c729bc6d1f2674ce5556de1fc57a6dac7f266a6e9425cd854f18dce7ab68be1f66da7d777029b377c38f9c618ae6b607d85306a7942c28c0d73fb08b6975c558f673601631a11e0fb2ee3f4ed3f5941ed5716df8c530c9ae4cbc3d10d9976d3c5c2e2c2de3aefd6bd8ed9657d35dfe8fcd59a686ddea50aa2bb821eff5f2db36f0181f81dc66b6d4aeda915bf37d4dd4e244e7d5e209fa976925f3b2152775c7cbce71b6f457d6254c23d09d9308721db9f25f358453f5a6c425444e076ecbfce6102e9a216c8af90e309a652ee08975ad9636f40181a78fe8f2c10e8af6cd628f945b1c2fd977f0b80a2cd93562a150556cc290da6d1ba004659ba675a6cc3166bee28a35dedde1baddf3eb29535380bd5ddec340132bea48a4bd8d2588c45e0a72115fb6c7f570eb36833cc0b6519ff39fdf9959adbfd642f730e6891cbab6c94cd1b0650bac0a376ab036ce15fe839d7cffde56aac59fe4b72bb1f8f1c2a9ea2ceab02e587124fe8071d365cdde3a3ac744b50df13ec3719e9ddc7660987e187885ea03a97ae24c10a66c832a80276e6caad1b23a1b50498242fd05741e1741e66d37240887eb297a2872f775cbf238a69533", 0x4f8}], 0x3}, 0x0) [ 2169.559261][T26353] loop3: detected capacity change from 0 to 131456 [ 2169.599673][ T22] kauditd_printk_skb: 161 callbacks suppressed [ 2169.599686][ T22] audit: type=1326 audit(1633448316.063:85691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26350 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2169.601829][T26353] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:38:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478b", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) [ 2169.612358][ T22] audit: type=1326 audit(1633448316.073:85692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26350 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 15:38:36 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @local}, 0x10, 0x0}, 0x48810) 15:38:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000880), 0x0, &(0x7f0000000940)={[{@uni_xlate}, {@fat=@check_strict}]}) [ 2169.690646][ T22] audit: type=1326 audit(1633448316.073:85693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26350 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 15:38:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) 15:38:36 executing program 1: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000160, 0x0) [ 2169.764201][ T22] audit: type=1326 audit(1633448316.073:85694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26350 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2169.788994][T26385] FAT-fs (loop5): bogus number of reserved sectors [ 2169.795531][T26385] FAT-fs (loop5): Can't find a valid FAT filesystem 15:38:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000280)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0}, 0x0) 15:38:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000001940)) [ 2169.805761][ T22] audit: type=1326 audit(1633448316.073:85695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26350 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2169.832177][ T22] audit: type=1326 audit(1633448316.073:85696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26350 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f380f3738d9 code=0x7ffc0000 [ 2169.873209][T26385] FAT-fs (loop5): bogus number of reserved sectors [ 2169.879754][T26385] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2169.893952][ T22] audit: type=1326 audit(1633448316.113:85697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26352 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2169.919136][ T22] audit: type=1326 audit(1633448316.113:85698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26352 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2169.944298][ T22] audit: type=1326 audit(1633448316.133:85699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26352 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2169.969755][ T22] audit: type=1326 audit(1633448316.133:85700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26352 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 15:38:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:39 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x82, 0x2}]}}}], 0x18}, 0x0) 15:38:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, 0x0) 15:38:39 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000240)={'mangle\x00', 0x4, "17a5d6c3"}, &(0x7f0000000340)=0x28) 15:38:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) [ 2172.638635][T26426] loop3: detected capacity change from 0 to 131456 15:38:39 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb7f9a8b34", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:38:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000001100)) 15:38:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg$unix(r0, &(0x7f0000000200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2142, 0x0) 15:38:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_tos_int={{0x69}}], 0x18}, 0x0) 15:38:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, 0x0) 15:38:39 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) 15:38:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000140)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) [ 2172.802453][T26444] loop3: detected capacity change from 0 to 131456 15:38:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x14, 0x0, 0x7, {[@noop]}}}], 0x18}, 0x0) 15:38:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @multicast2}, 0x10, 0x0}, 0x0) 15:38:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, 0x0) 15:38:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000004a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2002, 0x0) 15:38:42 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) 15:38:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB="40000000000601020000000000000000020000000500050003000000130003001c25b5f607737f719c5b38e086777e3850"], 0x40}}, 0x0) [ 2175.658680][T26470] loop3: detected capacity change from 0 to 131456 [ 2175.688335][ T22] kauditd_printk_skb: 126 callbacks suppressed 15:38:42 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) exit_group(0x0) 15:38:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0xa, 0x2, [{0x0, 0x2}, {0x0, 0x2}]}]}}}], 0x20}, 0x0) 15:38:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2175.688349][ T22] audit: type=1326 audit(1633448322.153:85827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26464 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2175.733453][ T22] audit: type=1326 audit(1633448322.153:85828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26464 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2175.760793][ T22] audit: type=1326 audit(1633448322.153:85829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26464 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 15:38:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@loopback}) 15:38:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000040)={{0x11, @empty, 0x0, 0x0, 'fo\x00'}, {@multicast2}}, 0x44) [ 2175.799196][ T22] audit: type=1326 audit(1633448322.153:85830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26464 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2175.862550][ T22] audit: type=1326 audit(1633448322.153:85831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26464 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2175.888283][ T22] audit: type=1326 audit(1633448322.153:85832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26464 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2175.913636][ T22] audit: type=1326 audit(1633448322.153:85833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26479 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2175.938558][ T22] audit: type=1326 audit(1633448322.153:85834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26479 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2175.963562][ T22] audit: type=1326 audit(1633448322.153:85835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26479 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 [ 2175.988268][ T22] audit: type=1326 audit(1633448322.153:85836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26479 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7fc05535c8d9 code=0x7ffc0000 15:38:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000280)=ANY=[]) 15:38:45 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg$unix(r0, &(0x7f0000002dc0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x178}}], 0x1, 0x0, 0x0) 15:38:45 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f000000a8c0)='ns/mnt\x00') 15:38:45 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x400000, 0x0) 15:38:45 executing program 5: r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) 15:38:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000140)={&(0x7f0000000040)={0xa, 0x4e24, 0x0, @empty, 0x546}, 0x1c, 0x0}, 0x0) 15:38:45 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 15:38:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x1, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) [ 2178.698725][T26509] loop3: detected capacity change from 0 to 131456 15:38:45 executing program 0: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000) 15:38:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_ttl={{0x14, 0x0, 0x2, 0x9}}], 0x18}, 0x0) 15:38:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={0x0, 0x21c}}, 0x0) [ 2178.768862][T26509] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2178.817159][T26509] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 15:38:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:48 executing program 0: socket$inet6(0xa, 0x47276b63da498661, 0x0) 15:38:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 15:38:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, 0x0) 15:38:48 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x119040, 0x0) 15:38:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) sendmmsg$inet(r1, &(0x7f0000001b00)=[{{&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000180)={0x2, 0x4e24, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4}]}}}], 0x18}}], 0x2, 0x0) 15:38:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000200)="22d963c9c9f534638330ea7ced7ac06d0670582451a0c01f11f8657559f61e594407ad98ce5c03c85b80bfee1d96bf87e6e8ab977b6668ee08f696d258829b0b3b0b16706fd058ae064e6e466facfe3dda466511e28d954d5641f751fef4ec43fdb35818c2e8c0c1e6b24f183ee33f9aebc2a5fdfbf949622a6f23fb27bb749ca2a4c70c11ae541495bf07baeb", 0x8d}], 0x1}, 0x0) 15:38:48 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 15:38:48 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x432400, 0x0) 15:38:48 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000005240)='ns/ipc\x00') 15:38:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000000000000000000007000000ff"], 0x18}, 0x0) 15:38:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_pktinfo={{0x0, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}], 0x18}, 0x0) 15:38:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in6=@dev}}, 0xe8) 15:38:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="400000000d060102000000000000000002000000050005000300000013000300686173683a6e65742c69666163650000050001"], 0x40}}, 0x0) 15:38:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x10}}, @ip_retopts={{0x24, 0x0, 0x7, {[@timestamp={0x44, 0x14, 0x13, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}]}}}], 0x38}, 0x0) 15:38:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 15:38:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="400000000d0601020000000000000000020000000500050003000000130003007eb22a37c4c4ac71054417ad67a2f0"], 0x40}}, 0x0) 15:38:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x2, [{0x0, 0x2}]}]}}}], 0x18}, 0x0) 15:38:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getpeername(r0, 0x0, 0x0) 15:38:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x20, 0x2, 0x7, 0x801, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 15:38:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f0000002300)) clock_gettime(0x0, &(0x7f0000002200)) 15:38:51 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 15:38:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000000)={&(0x7f00000000c0), 0xfffffffffffffc86, &(0x7f0000000040)={0x0, 0x21c}}, 0x0) 15:38:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:54 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) 15:38:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) 15:38:54 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000007700), 0x305200, 0x0) 15:38:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @multicast1}}}, @ip_ttl={{0x14}}], 0x38}, 0x0) 15:38:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="c5"], 0x2c}}, 0x0) 15:38:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000500)={@private2, @private2, @empty, 0x0, 0x401}) 15:38:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="40000000f10601"], 0x40}}, 0x0) 15:38:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@empty}, 0x14) 15:38:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000001800)={&(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, &(0x7f0000001740)=[{&(0x7f0000000080)="cf", 0x1}], 0x1}, 0xc840) 15:38:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000080)) 15:38:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), 0x4) 15:38:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000500)={@private2, @private2, @empty, 0x0, 0x401}) 15:38:57 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000c00)={{{@in=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x0, 0x49ea4a7ee7d22bc2}, {{@in=@private}, 0x0, @in6=@empty}}, 0xe8) 15:38:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x40) 15:38:57 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') ioctl$int_out(r0, 0x0, 0x0) 15:38:57 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000740), 0x119000, 0x0) 15:38:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 15:38:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000500)={@private2, @private2, @empty, 0x0, 0x401}) 15:38:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x2, 0x8, 0x201}, 0x14}}, 0x0) 15:38:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 15:38:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req={0xff, 0xfffffffe}, 0x10) 15:38:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000001800)={&(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, &(0x7f0000001740)=[{&(0x7f0000000080)="cf", 0x1}, {0x0}, {&(0x7f0000000740)='!', 0x1}], 0x3}, 0xc840) 15:38:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:57 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xfffffffd, 0x5, "59ad5a7f551ffd9a8a25b15f7ae7f77c751342", 0x2f1, 0x10001}) 15:38:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x0, 0x2}, @end]}}}], 0x18}, 0x0) 15:38:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000500)={@private2, @private2, @empty, 0x0, 0x401}) [ 2190.951968][T26687] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=26687 comm=syz-executor.0 15:38:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, 0x0, "499790fd2169bc4f1cc9b3041517d16f7e2a2016c9ba65314844cb1891ad88c2512a293992d918f43707cf556863c6c90e39d48e74480b72c0dea3029d7b42876aa6e7d9f407dadca3568b142f559afa"}, 0xd8) 15:38:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8916, 0x0) 15:38:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000280)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x24}, 0x3}, 0x1c, &(0x7f00000005c0)=[{&(0x7f00000002c0)="eaa27c8c676a64a1eabb8dec33489b6c91b3c3c0b1504f085a49fd7729a47bc80fe65f6885237466612ed363ff0fc8fc5cbc6ddbcf9b3c8d7b0a1fbdce112fdb9b4ffed0af357f9209f98736e99b185dcfa05748", 0x54}, {&(0x7f0000000340)="5c42251e91a5eb3a412dcd40d9552f16ec0b74d9add324121577a818f89cd4e1f54e6100d8b38cb7336846d6ab2dc10e9837824cc2779d325e8b201d6555a7d934922307e8a82fb1422a2d22d14341f660e0c665e7eb551d2da321b265cd8ef0a3", 0x61}, {&(0x7f0000000740)="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", 0xa94}], 0x3}, 0x48840) 15:38:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x77359400}) 15:38:57 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000740), 0x414201, 0x0) [ 2191.056281][T26687] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=26687 comm=syz-executor.0 15:38:57 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000400)) 15:38:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 15:38:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f000000a900)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000015c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002"], 0x88}}], 0x1, 0x0) 15:38:57 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 15:38:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:57 executing program 1: open$dir(0x0, 0x2201, 0x0) 15:38:57 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f00000003c0)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1e, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}], 0x20}, 0x0) 15:38:57 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RUNLINKAT(r0, 0x0, 0xfffffffffffffe29) 15:38:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2, 0x7}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@tclass={{0x14}}], 0x18}, 0x0) 15:38:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x1d, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_ID={0x2}, @CTA_MARK]}, 0x2c}}, 0x0) [ 2191.223693][T26742] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=26742 comm=syz-executor.0 15:38:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000000440)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffffffffffffe50, 0x0, 0x0, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @loopback}}}], 0x20}, 0x0) 15:38:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000001c0), 0x4) [ 2191.284689][T26756] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.5'. 15:38:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, 0x0, 0x0) 15:38:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 15:38:57 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x35f180, 0x0) 15:38:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:57 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x10040, 0x0) 15:38:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0)="78d715e8f98e1f2ad11f74e13640b2324dc10d1013c840571709ba94d6177a0501ed9c0f4ac7cc0d142d8008c87bcb9a52c7dd40667f323974bc6e4bd45a840c983192654ca56af99a4a0c021fcc15fd817381a28a59a58f4accbd093c4df5af95fe723cbdd355b31e295f8b0aae23b4be6338822e58507a7b0287e526a259bedbf2996fb43051db7dc05d90da66f893b704476721a52a4b19bf7d8d0cd17e97d504326c2320285d597b30d7467b"}, {&(0x7f00000000c0)="838889e140125f8e797b707615eb3dda32c5841427e539470234a1ab9c538397df8b5c83aefa5b5fae044b73a29b76ac434c5702f1cc417d3f7003b68960a261b93d9fb00d1c2500c6d350ceb182ec83c1a65507e18f4fb7887ae600e88336802d4f307825fde40ca81e9720dce1b75bb53ecd31d17ae51c8b0fb2372ad28ae751d9f985ea1637", 0x87}], 0x2, 0x0, 0x27}, 0x20040004) 15:38:57 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, 0x0) 15:38:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2191.468773][T26781] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=26781 comm=syz-executor.0 15:38:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000012c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000141, 0x0) 15:38:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000280)={0xa, 0x4e21, 0x0, @dev}, 0x1c, &(0x7f00000005c0)=[{&(0x7f00000002c0)="eaa27c8c676a64a1eabb8dec33489b6c91b3c3c0b1504f085a49fd7729a47bc80fe65f6885237466612ed363ff0fc8fc5cbc6ddbcf9b3c8d7b0a1fbdce112fdb9b4ffed0af357f9209f98736e99b185dcfa05748", 0x54}, {&(0x7f0000000340)="5c42251e91a5eb3a412dcd40d9552f16ec0b74d9add324121577a818f89cd4e1f54e6100d8b38cb7336846d6ab2dc10e9837824cc2779d325e8b201d6555a7d934922307e8a82fb1422a2d22d14341f660e0c665e7eb551d2da321b265cd8ef0a3", 0x61}, {&(0x7f0000000740)="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", 0xa94}], 0x3}, 0x0) 15:38:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2, 0x7}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@hopopts={{0x18}}, @tclass={{0x14}}], 0x30}, 0x0) 15:38:58 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$P9_RREADDIR(r0, 0x0, 0x0) 15:38:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 15:38:58 executing program 1: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x447}, &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x5]}, 0x8}) 15:38:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x18, 0x3, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 15:38:58 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x4}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x5]}, 0x8}) 15:38:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x51, &(0x7f0000000040)=ANY=[], 0x68}, 0x0) 15:38:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x2, 0x0, @local}, 0x45, &(0x7f0000000000)=[{&(0x7f0000000200)="22d963c9c9f534638330ea7ced7ac06d0670582451a0c01f11f8657559f61e59fe000000ce5c03c85b80bfee1d96bf87e6e8ab977b6668ee08f696d258829b0b3b0b16706fd058ae064e6e466facfe3dda466511e28d954d5641f751fef4ec43fdb35818c2e8c0c1e6b24f183ee33f9aebc2a5fdfbf949622a6f23fb27bb749ca2a4c70c11ae541495bf07baeb69d1b6d991f8c9f38d8e95e2bb6a5cc93d40bdae459e81b6b924423c0aae44e72b960b9f44fbc25de68078a8d0c3360ca94bc433d64a0c8e74dddfbadef46755a2580a7c1dfb960c822ddd8e283189143eed3162c999f7c2", 0xe5}, {&(0x7f0000000140)="facdb508c77aadc27c0d5383fb1d522e2b323557b6c82e8382c9a3e8f3fa", 0x1e}], 0x2, 0x0, 0x11}, 0x0) [ 2191.602081][T26813] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=26813 comm=syz-executor.0 15:38:58 executing program 0: accept4(0xffffffffffffffff, 0x0, 0x0, 0x81000) 15:38:58 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000002680)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}}], 0x1, 0x0) 15:38:58 executing program 3: socket(0x26, 0x5, 0x1dc9) 15:38:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10, 0x0}, 0x400885c) 15:38:58 executing program 5: socketpair(0x26, 0x5, 0x101, 0x0) 15:39:01 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg$unix(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 15:39:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000280)={0xa, 0x4e21, 0x0, @dev, 0x3}, 0x1c, &(0x7f00000005c0)=[{&(0x7f00000002c0)="eaa27c8c676a64a1eabb8dec33489b6c91b3c3c0b1504f085a49fd7729a47bc80fe65f6885237466612ed363ff0fc8fc5cbc6ddbcf9b3c8d7b0a1fbdce112fdb9b4ffed0af357f9209f98736e99b185dcfa05748", 0x54}, {&(0x7f0000000340)="5c42251e91a5eb3a412dcd40d9552f16ec0b74d9add324121577a818f89cd4e1f54e6100d8b38cb7336846d6ab2dc10e9837824cc2779d325e8b201d6555a7d934922307e8a82fb1422a2d22d14341f660e0c665e7eb551d2da321b265cd8ef0a3", 0x61}, {&(0x7f0000000740)="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", 0xa94}], 0x3}, 0x48840) 15:39:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000140)={@dev, @private}, 0x8) 15:39:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:01 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x9, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x3}, 0x4) 15:39:01 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) write$P9_RRENAME(r0, 0x0, 0x0) 15:39:01 executing program 3: fork() waitid(0x0, 0x0, 0x0, 0x40000003, 0x0) 15:39:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002740)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, 0x0}}, {{&(0x7f00000000c0)={0x2, 0x4e20}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}], 0x20}}], 0x2, 0x0) 15:39:01 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x142, 0x0) 15:39:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4a22, @empty}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="3c00000000000000000000f4"], 0x40}, 0x0) 15:39:01 executing program 1: unshare(0x4e030f80) 15:39:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000023c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002300)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x48}}], 0x1, 0x0) 15:39:01 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1}, 0x4) 15:39:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000640), 0xfffffffffffffe61}, 0x0) 15:39:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:04 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x1ffffff, @private0}, 0x1c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x14, &(0x7f0000000040), 0x50) 15:39:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) 15:39:04 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14}, 0xffffff6f) write$9p(r0, &(0x7f0000000080)='1', 0x1) 15:39:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff9}, 0x20) 15:39:04 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) sendmmsg$inet(r1, &(0x7f0000001b00)=[{{&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000180)={0x2, 0x4e24, @multicast1}, 0x10, 0x0}}], 0x2, 0x0) 15:39:04 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') ioctl$int_out(r0, 0x5460, &(0x7f0000000640)) 15:39:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2a, 0x0, "499790fd2169bc4f1cc9b3041517d16f7e2a2016c9ba65314844cb1891ad88c2512a293992d918f43707cf556863c6c90e39d48e74480b72c0dea3029d7b42876aa6e7d9f407dadca3568b142f559afa"}, 0xd8) 15:39:04 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14}, 0xffffff6f) 15:39:04 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x32, &(0x7f0000000000)="e24f72789ca0a85cbde64404546f3974b6afda37", 0x14) 15:39:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000380)={@rand_addr=' \x01\x00', @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0xff}) [ 2197.656709][T26913] sock: sock_set_timeout: `syz-executor.5' (pid 26913) tries to set negative timeout [ 2197.676092][T26917] sock: sock_set_timeout: `syz-executor.5' (pid 26917) tries to set negative timeout 15:39:04 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000001640)={0x11, 0x6, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 15:39:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f0000006380)) 15:39:07 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000007700), 0x0, 0x0) 15:39:07 executing program 0: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x3800000000000000}, 0x0, 0x0) 15:39:07 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:39:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:07 executing program 3: socket$inet(0x2, 0x8000a, 0x0) 15:39:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}], 0x18}, 0x0) 15:39:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8918, 0x0) 15:39:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0) 15:39:07 executing program 2: pipe2(&(0x7f00000020c0)={0xffffffffffffffff}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000002180), r0) 15:39:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[], 0x40}}, 0x0) 15:39:07 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000002d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) 15:39:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) sendmmsg$inet(r1, &(0x7f0000001b00)=[{{&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, 0x0}}], 0x1, 0x0) 15:39:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000002680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=ANY=[@ANYBLOB="1c"], 0xa0}}], 0x1, 0x0) 15:39:07 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x140) 15:39:07 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e23, 0x72d9, @private2, 0x200}}, 0x0, 0x0, 0x1c, 0x0, "15dfa210710a726d94e5acf0659a3207ac69853dd5c0e5d8c7658ad8de18b096d6ecaca99c575d5e67bbbeb573b0d93f4370b2370eef734c05f2582fddc0eb3696c8074853552c7054b5a68920c6d372"}, 0xd8) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000900), 0x101000, 0x0) socket(0xa, 0x1, 0x5) write$P9_RREAD(r1, &(0x7f0000000940)={0xa4, 0x75, 0x1, {0x99, "65f03ae90175fed058e6f55e38d0087f7110cf6059064fa7000ea7f435ac5402eaf93eac5628b48f1c00df51daf4d5d0636bd1d3fa9159564dd091609c20e60c9bddfe27aca1a30f2517e77bc8efa0857aafee2cd539aab480b19611f24c0b2bcaa6ed7005d144d4c5a9730675466fe10b693103a5ebd2d1b534020c409926de21eab08d1dad81a61883d2759348770630aed8a62d38798fcf"}}, 0xa4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x4400, 0x0) 15:39:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0xfffffc82}}, 0x0) 15:39:10 executing program 2: rt_sigpending(&(0x7f0000000000), 0xffffffffffffff5c) 15:39:10 executing program 0: getresuid(&(0x7f00000074c0), &(0x7f0000007500), &(0x7f0000007540)) 15:39:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="400000000d0601"], 0x40}}, 0x0) r1 = dup(r0) syz_genetlink_get_family_id$fou(&(0x7f0000001e00), r1) 15:39:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007940)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)='\b', 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000028c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}], 0x20}}], 0x2, 0x0) 15:39:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "e41f3fa245a387743fefc77bf6ff4d09bd6819"}) 15:39:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)={0x18, 0x2, 0x7, 0xf01, 0x0, 0x0, {}, [@NFACCT_FILTER={0x4}]}, 0x18}}, 0x0) 15:39:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 15:39:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x34, 0xd, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x34}}, 0x0) 15:39:10 executing program 5: shmat(0xffffffffffffffff, &(0x7f0000ffe000/0x1000)=nil, 0x0) 15:39:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) accept$unix(r0, 0x0, 0x0) 15:39:13 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:13 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x1000, 0x1000}, 0x1c) 15:39:13 executing program 3: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/203) 15:39:13 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000'}, 0xffffffffffffffda) 15:39:13 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x8abc9403fe62604}, 0x4) 15:39:13 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) 15:39:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) 15:39:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000001d80)={0x0, 0x0, &(0x7f0000001cc0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x12042) 15:39:13 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000011", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='.', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 15:39:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@remote, @remote, @local, 0x0, 0x2f3c}) 15:39:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x28, 0x2, 0x7, 0x101, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 15:39:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@dontfrag={{0x14, 0x29, 0x3e, 0x9}}], 0x18}, 0x0) [ 2206.863439][T27078] netlink: 44302 bytes leftover after parsing attributes in process `syz-executor.3'. 15:39:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000040)={'wg1\x00', @ifru_data=0x0}) 15:39:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000004a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 15:39:16 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8abc9403fe62604}, 0x4) 15:39:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5}]}, 0x1c}}, 0x0) 15:39:16 executing program 0: socketpair(0x0, 0x2a74e2f643084bfb, 0x0, 0x0) 15:39:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080), 0x4) 15:39:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) 15:39:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3, 0xcf}]}}}], 0x18}, 0x0) 15:39:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x20, 0x2, 0x8, 0x401, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 15:39:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f000000af40)) 15:39:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000200)="22d963c9c9f534638330ea7ced7ac06d0670582451a0c01f11f8657559f61e594407ad98ce5c03c85b80bfee1d96bf87e6e8ab977b6668ee08f696d258829b0b3b0b16706fd058ae064e6e466facfe3dda466511e28d954d5641f751fef4ec43fdb35818c2e8c0c1e6b24f183ee33f9aebc2a5fdfbf949622a6f23fb27bb749ca2a4c70c11ae541495bf07baeb69d1b6d991f8c9f38d8e95e2bb6a5cc93d40bdae459e81b6b924423c0aae44e72b960b9f44fbc25de68078a8d0c3360ca94bc433d64a0c8e74dddfbadef46755a2580a7c1dfb960c822ddd8e283189143eed3162c999f7c2", 0xe5}, {&(0x7f0000000140)="facdb508c77aadc27c0d5383fb1d522e2b323557b6c82e8382c9a3e8f3fa", 0x1e}], 0x2}, 0x0) 15:39:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) 15:39:19 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f00000015c0), 0x1090c0, 0x0) 15:39:19 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x109482, 0x0) 15:39:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_SYNPROXY={0x4}, @CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, @CTA_ZONE={0x6}]}, 0x38}}, 0x0) 15:39:19 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 15:39:19 executing program 3: perf_event_open$cgroup(&(0x7f0000008300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:39:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@private2, @private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x9}) 15:39:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x2, 0x4e22, @broadcast}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x20}, 0x0) 15:39:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000023c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002300)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x10}}], 0x28}}], 0x1, 0x0) 15:39:19 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000024c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x4c68}) 15:39:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000023c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002300)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0) 15:39:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:22 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8abc9403fe62604}, 0x4) 15:39:22 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0xc001, 0x0) 15:39:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f00000005c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000740)=ANY=[], 0xb0}, 0x0) 15:39:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f00000005c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="98000000000000002900000037000000000f0000000000000738000000000c00fdff000000000700000000000000010000000000000000000000f001000004e812d70007000000000007400000000ea31c45000000000001000000feffffffffffffffff0300000000000004000000000040000700000000000000034ab1d5418bde8d58237cc9d6e6186bb80000000000000001ffffffffff"], 0xb0}, 0x0) 15:39:22 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='[/{-\x00') 15:39:22 executing program 3: r0 = gettid() sched_getaffinity(r0, 0x8, &(0x7f0000000040)) 15:39:22 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000140)={&(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="1c", 0x1}], 0x1}, 0x0) 15:39:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000002880)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x98}}], 0x1, 0x10040, 0x0) 15:39:22 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2, 0x7}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@hopopts={{0x18}}, @tclass={{0x14}}, @tclass={{0x14, 0x29, 0x43, 0x400}}], 0x48}, 0x0) 15:39:22 executing program 1: pipe2$9p(&(0x7f0000006400), 0x80000) 15:39:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2c, 0x3, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_LABELS_MASK={0x18, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) 15:39:25 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:25 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/system', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000040)) 15:39:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x35, 0x0, 0x0) 15:39:25 executing program 1: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9) 15:39:25 executing program 0: unshare(0x10000) 15:39:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 15:39:25 executing program 1: readlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) 15:39:25 executing program 2: symlinkat(&(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00') 15:39:25 executing program 0: bind$unix(0xffffffffffffff9c, 0x0, 0x0) 15:39:25 executing program 5: pipe2(&(0x7f0000000180), 0x0) 15:39:25 executing program 3: clock_nanosleep(0x1, 0x0, &(0x7f0000000040), 0x0) 15:39:25 executing program 1: socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000018c0)) 15:39:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:28 executing program 2: madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 15:39:28 executing program 0: madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 15:39:28 executing program 5: madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), 0x0) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 15:39:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000018c0)) 15:39:28 executing program 1: r0 = socket(0xa, 0x3, 0x2) connect(r0, &(0x7f0000000000), 0x80) 15:39:28 executing program 3: madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 15:39:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10, 0x0}, 0x0) 15:39:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000140)={'veth1_vlan\x00', @ifru_mtu}) 15:39:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') read$usbmon(r0, 0x0, 0x0) 15:39:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001740)={[{@fat=@nfs}]}) 15:39:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x27, 0x0, &(0x7f00000000c0)) [ 2221.995918][T27297] FAT-fs (loop2): bogus number of reserved sectors [ 2222.002578][T27297] FAT-fs (loop2): Can't find a valid FAT filesystem 15:39:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000040)=0x7ff) 15:39:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) 15:39:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_matches\x00') read$usbmon(r0, 0x0, 0x0) read$usbmon(r0, &(0x7f00000000c0)=""/128, 0x80) 15:39:31 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000840), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000880)={{}, 0x0, 0x0, 'id0\x00', 'timer1\x00'}) 15:39:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sched\x00') read$usbmon(r0, 0x0, 0x0) 15:39:31 executing program 1: r0 = epoll_create(0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = epoll_create(0xffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0xe000000b}) 15:39:31 executing program 0: shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffa000/0x2000)=nil, 0x4000) 15:39:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000280)={'macvtap0\x00', &(0x7f0000000200)=@ethtool_eeprom={0x43}}) 15:39:31 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') read$usbmon(r0, &(0x7f0000002080)=""/4103, 0x1007) 15:39:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0), 0x4) 15:39:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x6e6bb3}, {{@in6=@mcast1}, 0x0, @in=@private}}, 0xe8) 15:39:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000001c0)={0x0, {{0xa, 0x0, 0x0, @private1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 15:39:34 executing program 1: request_key(&(0x7f00000007c0)='dns_resolver\x00', &(0x7f0000000800)={'syz', 0x1}, 0x0, 0xfffffffffffffffc) 15:39:34 executing program 2: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) 15:39:34 executing program 0: r0 = socket(0x11, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000d40)=[{{&(0x7f0000000580)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "7cbc7aedbd71dd7eda747969e55f59df786eb152d720b35dfae4d1f1a11b3a95473b4cdec7cce8aa5165f813d12a67baa2f5189da0d85ba5ad7e1320b499fe"}, 0x80, 0x0}}], 0x1, 0x0) 15:39:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004280)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000080)="87", 0x1}, {&(0x7f0000003f80)='&', 0x1}, {&(0x7f0000000140)='\"_', 0x2}], 0x3}}], 0x1, 0x0) 15:39:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f0000000080)) 15:39:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000001700)={&(0x7f0000000180)=@xdp, 0x80, &(0x7f0000001580)=[{&(0x7f0000000200)=""/94, 0x5e}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001640)=""/171, 0xab}, 0x40000020) syz_genetlink_get_family_id$devlink(&(0x7f00000091c0), r0) 15:39:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000880)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1, 0x8001}, 0x1c, 0x0}}], 0x1, 0x0) 15:39:34 executing program 5: pselect6(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}, 0x0) 15:39:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x0, 0x0, 0x0, 0x4}, 0x20) 15:39:34 executing program 0: r0 = epoll_create(0x4) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) [ 2228.035133][T27390] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 15:39:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000000), 0x8) 15:39:37 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) 15:39:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 15:39:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 15:39:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200), 0x4) 15:39:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x5, &(0x7f0000000000)="59ec30f1bc2be05b84531743fc44cfd1", 0x10) 15:39:37 executing program 5: prctl$PR_SET_MM(0xd, 0x0, &(0x7f0000ffd000/0x2000)=nil) 15:39:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000140)={'batadv_slave_1\x00', @ifru_mtu}) 15:39:37 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000001100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0xee01, r1, 0x0) 15:39:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002380)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 15:39:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0xf8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 15:39:40 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004280)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote, 0x9}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000080)="8769baf2b43a3d7834bbf91bde6cf42bc9939d3d1dd23cf3c1ccdfedb235a6695a986546d31c5de574743bb8957c9c6d0344d38a8d6f43e3917cb67dbed3fb1ccbe7efeff8b0506f73d06e6e208193723bc8a029a94dc58881635e", 0x5b}, {&(0x7f0000003f80)='&', 0x1}, {&(0x7f0000000140)='\"_', 0x2}], 0x3}}, {{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @private0}, 0x1c, 0x0}}], 0x2, 0x0) 15:39:40 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0xffffffae) 15:39:40 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000340)="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", 0xec1}], 0x2}, 0x0) 15:39:40 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/softnet_stat\x00') read$usbmon(r0, &(0x7f0000000080)=""/4096, 0x1000) 15:39:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="34000000047f8d"], 0x34}}, 0x0) 15:39:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000100)={0xa, 0x4e22, 0x0, @local}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000140)="79e2e164ec7ad4656da374621cf47716c5bf6fe1ed36cc1446b6e945faa42a8def01e1df532ea0f7317b07f38106bc02f3f35311d1b90b5d1bc266c842956801a9fd5985fd54f660fd7b555f1b224e7e0d726cea3bb85c2f6c5ce43f21326de2fc4ab4627e87d5d9bcc0f23e91371d635de7630fe63a68783ff99e90f7637787192b67a62df2cb469c3740b5fdc51c8d52a5c132fc2a2617f97914de939ca4117fd86050574ab2701e", 0xa9}, {&(0x7f0000000340)="95", 0x1}], 0x2}, 0x0) 15:39:40 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') read$usbmon(r0, &(0x7f0000001080)=""/4096, 0x1000) 15:39:40 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="a7", 0x1}], 0x1, &(0x7f0000000300)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0x28}, 0x40) 15:39:40 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') read$usbmon(r0, 0x0, 0x0) read$usbmon(r0, &(0x7f0000002080)=""/4103, 0x1007) 15:39:40 executing program 0: r0 = shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x4000) shmdt(r0) 15:39:40 executing program 3: add_key(&(0x7f0000000400)='big_key\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 15:39:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@empty}, 0x14) 15:39:43 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) 15:39:43 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/rt6_stats\x00') read$usbmon(r0, 0x0, 0x0) 15:39:43 executing program 0: epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r0 = socket(0x11, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00'}) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6gre0\x00'}) 15:39:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r1, &(0x7f000000a1c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') read$usbmon(r0, 0x0, 0x0) 15:39:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'veth0_to_bridge\x00', &(0x7f0000000180)=@ethtool_dump={0x3f}}) 15:39:43 executing program 0: r0 = socket(0x18, 0x0, 0x4) accept$packet(r0, 0x0, 0x0) 15:39:43 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_tables_targets\x00') read$usbmon(r0, &(0x7f0000000080)=""/4096, 0x1000) read$usbmon(r0, 0x0, 0x0) 15:39:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_bridge\x00', &(0x7f0000000340)=@ethtool_eeprom={0x44}}) 15:39:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, 0x0, 0x0) 15:39:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000000)={'veth1_macvtap\x00', @ifru_mtu}) 15:39:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='time_offset=0x000000001000']) 15:39:43 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 15:39:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000180)="b3", 0x1, 0x0, 0x0, 0x0) recvmmsg$unix(r1, &(0x7f0000005a80)=[{{0x0, 0x0, &(0x7f0000002400)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010040, 0x0) 15:39:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000076c0)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty, 0x1b5}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x14, 0x29, 0x3e, 0x1f}}], 0x18}}], 0x1, 0x0) 15:39:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='sched\x00') write$P9_RREADDIR(r0, 0x0, 0x0) 15:39:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:43 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x40200, 0x0) 15:39:43 executing program 2: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000000)={'veth1_to_hsr\x00', @ifru_names}) 15:39:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x0) 15:39:43 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x19}) 15:39:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$inet6(r0, 0x0, &(0x7f0000000400)) 15:39:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@mcast1}, 0xa, @in=@private}}, 0xe8) 15:39:43 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="8a", 0x1, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) 15:39:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004280)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000080)="8769baf2b43a3d7834bbf91bde6cf42bc9939d3d1dd23cf3c1ccdf", 0x1b}, {&(0x7f0000003f80)='&', 0x1}], 0x2}}, {{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @private0}, 0x1c, 0x0}}], 0x2, 0x0) 15:39:43 executing program 5: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="8a", 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r0, &(0x7f0000000000)=""/153, 0x99) 15:39:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') read$usbmon(r0, 0x0, 0x0) read$usbmon(r0, &(0x7f0000000000)=""/194, 0xc2) 15:39:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@local, @private2, @dev, 0x0, 0x2, 0x0, 0x0, 0x0, 0x22660030}) 15:39:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:46 executing program 3: r0 = epoll_create(0x4) epoll_wait(r0, &(0x7f0000001880)=[{}], 0x1, 0x20030) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 15:39:46 executing program 0: select(0x87, &(0x7f0000000000)={0x0, 0x0, 0x7}, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x0, 0x2710}) 15:39:46 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@local, @private2, @dev, 0x0, 0x2, 0x0, 0x0, 0x0, 0x22660030}) 15:39:46 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_mr_cache\x00') read$usbmon(r0, &(0x7f0000000100)=""/167, 0xa7) 15:39:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond_slave_1\x00', &(0x7f0000000000)=@ethtool_modinfo}) 15:39:46 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@local, @private2, @dev, 0x0, 0x2, 0x0, 0x0, 0x0, 0x22660030}) 15:39:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000180)="b3", 0x1, 0x0, 0x0, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x40000002, 0x0, 0x0) 15:39:46 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='gid_map\x00') read$usbmon(r0, &(0x7f0000002080)=""/4103, 0x1007) 15:39:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@local, @private2, @private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100251}) 15:39:46 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@local, @private2, @dev, 0x0, 0x2, 0x0, 0x0, 0x0, 0x22660030}) 15:39:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000100)={0xa, 0x4e22, 0x0, @local}, 0x1c, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000280)="2f4ab7a2c7bc9d1fa69b3f54c30efa08c7788d4fdde5dbb774b8570a473409b54684238747b6c8ab69c860b5e6bdc8f79faeb4afcd66a063a5ff9c", 0x3b}, {&(0x7f0000000340)="95", 0x1}], 0x3}, 0x0) 15:39:49 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0)={0x0, 0x2710}, 0x10) 15:39:49 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x1}, 0x6e) 15:39:49 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp\x00') read$usbmon(r0, &(0x7f0000002080)=""/4103, 0x1007) 15:39:49 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ustat(0x4, &(0x7f0000000000)) 15:39:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:49 executing program 0: r0 = socket(0x11, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000d40)=[{{&(0x7f0000000580)=@nfc_llcp={0x27, 0x1, 0x0, 0x7, 0x0, 0x0, "7cbc7aedbd71dd7eda747969e55f59df786eb152d720b35dfae4d1f1a11b3a95473b4cdec7cce8aa5165f813d12a67baa2f5189da0d85ba5ad7e1320b499fe"}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000600)="8f", 0x1}, {&(0x7f0000000a80)="be", 0x1}], 0x2, &(0x7f0000001c80)=[{0x10}, {0x10}], 0x20}}], 0x1, 0x4040840) 15:39:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 15:39:49 executing program 5: add_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0) 15:39:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000240)={'sit0\x00', 0x0}) 15:39:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/nf_conntrack\x00') read$usbmon(r0, 0x0, 0x0) 15:39:49 executing program 3: shmat(0x0, &(0x7f0000ffa000/0x2000)=nil, 0x5000) 15:39:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004280)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote, 0x9}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000080)="8769baf2b43a3d7834bbf91bde6cf42bc9939d3d1dd23cf3c1ccdfedb235a6695a986546d31c5de574743bb8957c9c6d0344d38a8d6f43e3917cb67dbed3fb1ccbe7efeff8b0506f73d06e6e208193723bc8a029a94dc58881635e", 0x5b}, {&(0x7f0000003f80)='&', 0x1}, {&(0x7f0000000140)='\"_', 0x2}], 0x3}}, {{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@hoplimit_2292={{0x14}}, @tclass={{0x14, 0x29, 0x43, 0x8000}}], 0x30}}], 0x2, 0x0) 15:39:49 executing program 1: socket(0x18, 0x0, 0x4) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, &(0x7f0000000140)={0x0, 0x2710}) 15:39:49 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000400)={0x0, 0x0, 0x0}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x10) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 15:39:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_int(r0, 0x1, 0x2c, 0x0, &(0x7f00000000c0)) 15:39:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000001700)={&(0x7f0000000180)=@xdp, 0x80, &(0x7f0000001580)=[{&(0x7f0000000200)=""/94, 0x5e}, {0x0}, {0x0}], 0x3}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000091c0), r0) 15:39:52 executing program 3: ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)) getcwd(&(0x7f00000003c0)=""/141, 0x8d) 15:39:52 executing program 2: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 15:39:52 executing program 1: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x80}, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x80000001]}, 0x8}) 15:39:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/netstat\x00') read$usbmon(r0, 0x0, 0x0) 15:39:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100), 0x4) 15:39:52 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{&(0x7f0000000580)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "7cbc7aedbd71dd7eda747969e55f59df786eb152d720b35dfae4d1f1a11b3a95473b4cdec7cce8aa5165f813d12a67baa2f5189da0d85ba5ad7e1320b499fe"}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 15:39:52 executing program 0: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="8a", 0x1, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="8a", 0x1, 0xfffffffffffffffd) 15:39:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002380)={0x1eb0, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_FRAME={0x148a, 0x33, @data_frame={@qos_ht={{{@type01={{}, {}, @device_b, @random="e3f82a3d3186", @device_b}}, {@type11={{}, {}, @broadcast, @device_b, @random="d04842cdc7aa"}}}}, @a_msdu=[{@broadcast, @device_a, 0x57, "7cd178983b2818f236d18d514640690bb2bbc84f71849cd9a392ff5c8a20ec940d77f6936de515f81e59318abe1c758fbb8bbeb555f511b9177072746def1bd67a11f8ee250b9526199d024fe8c38a805a062b0e7b0e30"}, {@device_a, @device_a, 0x4f, "0c43f45161a6c6ff01290a2e93da99aa41f66b64d76d558646d370a7b7ea27469a1e9fa8b9322fd55545958be7d2f0bb1a1e46d9222ccff499058816583af40b41fd99b8c77dc5426b562fca304a35"}, {@device_b, @broadcast}, {@device_a, @broadcast, 0x57, "3e5305c0cd93a87fa50da24af3b3730e5f19961232917a397078f01c6a39592029f4638eb1e94cfbebdb7682f1bad84bff1ce990030fe74ed1e51a87e9b9017ad7632fe9a3c8b86824d837f3d1355d74638b6b252972ee"}, {@device_a, @broadcast, 0x8f, "1b24342f3928d5c61eda84de27290c000c8ccb518357a760fd15d5935dfe66db11f0317a891095921647389801acde23c8f3242f4bdb1785710064ce723866c8fd08f7078b32214e6b23027f574a5eae28016d1ef5a91534f1f6f9038762b9ac360ec20cbf5f99c987ac0244c7cbb94508c8e4895685ee2d6f36ae95de6e6f17db8886498bee1d5d569884c1fc2efa"}, {@device_b, @device_b, 0xdf, "bd55e7710c664c6bbce5315df31c04013522723749940bded3f528400abea310719aa13393a7919db5a920f1f8f73f80db6195b1b0f3da2497917b75c33938d4f066c49782fc842e49c0dae4ee5a03e39608bbfa1656bfe8390f54348696b18de0e9946f71a0396c1b05ba7c5c92451cb77679173fad30a897622de421774f4793255a39a838f24e1bda44343cfcc1efe36af0ff0bb7bb2bde9766a5e3ea95d6806ac8921291c7ce385e245a4e2e243800c7cf99ca7c36460a748fe0f03ec894dd7862b777d6bd48a6bbe34b01a5001d52333520860471f91bcf9ec22f2d1c"}, {@broadcast, @broadcast, 0x8b, "037c20af57c2df54fbcbf2dd4945b0c08dcd947aad02a1244cdbd7e1e8d6f38aec0ba90920a3066f3533c998dcc26d0d136bbd0e3b8c87f69dac7619de9c210160651ac999e8c2a8cb560cb940db4ddac0730beeb67ce0c9303bf67fdb8bd21fa9193196038c1b742ddf32645e4f497a4a71b4170aae1ea538f6a826721611308ad348931a8cc4eab74eae"}, {@device_b, @device_b, 0xfff, "0eb92e8abcacdb2fea08f350b02621c4019b86044b6cb2d5450ea635941468d10d941c803c19aa7fe77ad84ddd9dd6b3c8506720ba4dc4bf243281fb366affc20a9481cfb2ba8f5d293abd88b66b61259b8fb3151f78f069a4973c3b56fde754a6c87016522858c5b3314bf619616f5ff6e18ef3a9b72dd3dc34fd77af6a3ae1a0e9a37bf12b30135064ddad1422f8f4959182a4092d566e294304ea564ad54bb9d20a8dc2fb184b68bb8fd6c5f56fcc17f41dfe9847563676fec6e0e1e8cd1aaa22927e71182dba837bf0ef702b482f8be6773dc66cb74e994c185f4dcf4ea4082aadab3dfc3182c7a371c49cb4372fa2120a27b220da5b68e0700621f00480fc899dd930d55b51f0e210e480b56385d700b125ca3c883cc49bb8e62bd5beb240775ec03d1f5d199adc90a3bac35d29acf183778320b0b33be1902e0dc5d7e507fcd6fed2482ead5394a32235a386047c86f01414cf7205d7407a6bb85f02c35280b12b65670c15c4dd40752ea419c198db056cd8420bc3b5b23d03b2453f07c69cc479897f37979c6f468f3f7da39905fb38d1a0292bf7e2ea2e5ae35b2c6c837681c16c9e0bcfd0e0badaa79ef1912f04d4af8edf4e4c8089419447bf103f6ada234a1bd69175edb5152f6ee465eeca01e571d36de42097cdc1a1affef8dcaa38e9196112478f2f81230bea3adbf8ad29cdb31a7230fa1ba366ded1af1ff53ede9e911e50cd5174467d920882551e4995715f81fc2b680b30bd5dbe41296e748e7d92eefb787ebc9f278b06d5eeef4843037a346bff8f7ef82cd91e04351140b6a0a21cbc1658daaef8a25f9799207822899be88997dd2a9183bbd0115a94bdab11adc0effe5c0dca912a91d924045ed985fc97183d51246a12d48997762756b55b428683c1f23d8d001aa188f807572dbc7ec74d3e5bc91d6a7df93e40ad2d87caeb8b2f875532a072e5c64580c8fc378ba13a5c08af660d1c10d88ff398599f1b26d7e7a5017dcc7f5bf5b71f0720f9cecc0148a96ea9ea2dc599a9c506d76d7dd69d03803584757bd5c3a8f28d6e2cdcf347b88170d2346c7a56bf8594cab8b790ae32bd98b6ab792cd4407c37e95bdd37d97487434f3b275e7ad69cff41db14e278aeb6afe4fb202e880771b455eccb43fea64a12cbd4ff745b5479f719f5ef407765edc732efbdc88e5533d8244bdd53c2f7177f394bb51992631795a915fbba7044db87bf3a760470349732956fd1dbe9482cc3f8c6b1bcff508b647bbd99c21cf431d72db50ecd98e6c02219d92dde623636fdd3cdbb0de0786d00042e2b8fc7f5fb92f06d409f207f43bc331e9bdebafd355e96ac0b2b44c908d349ad62f0094672cc8ca6824bb5f2508c735f0cf369e3aa5ab4bbcf31a035bee5a3e473574c39df45ddf07a6d433c42ca010f3e1d00c8fb631fb2d05e30f0157503f0ee4991528751518c0e13184750b5999e674570fd7e3e21f73fc1ebe480e7120ca5f80d6ae974f9656a9643e0c46601274de7505dce4e7ca59cd02c81e41bed3f052d5646367994eee0e9ae364d2620e7a909b3a760096b99ce8e78ae4a71b7c2ddfba38f498cc6b6ddbd9ce782612b1a757cb69cace6b87d98344699a30cc11202bfd762c6e8631f51b891ed40d4a87f37cd2d1b83b0d0598f2cd1cdf801d8b97b4a9a798f11abcb701aa57999e5228ec914185ed32624732810b17b14006844cb5cceb95a432927d69d0468ce67acceaaf908469796379f7b0be22b19a741cfa192762bd5e7e7b5d570b9993d151360633aa48a94a963486d73ab83ea6f52cbfaca4d871e2d03929897a4b1b911ad8f9228a69901ee5e6e9de7a20bdfaa54b4c53f2c15fefc0ba15335780beba0e0e0d9a641b7d9935f272b043f08e69bd37efdeaead19253c4f77b60781f0f5247ca334ce6d7b708ae006836a934ca17ded777583c714017b5e5c5a2cff4e633cd94f9b6702bd399c8ed15589438e7c43c3ffdee2b6d4c90e2d8ac213cb74df9f88c550166217492bd6293ad0d0be559ca97c0ae331be3b69f8d221d8205a51c4cb60d3e41b2f8c85c60e5027ebc0f42fb1d483a58f4e593619a78984448adaa703920b5a4fa7c520adbe4d6ed90cc4a244690c6ee3a1ec54c456c14f2a24d32806fad03c9ad28a9b5a3c3b5e9269941433fef2a309f1d8416a3e88ef3ee401d8eedaab5c883e6b4d90fbddc60ac8502bf0f7f9b6e18668d95e1b952d9f397520960a72e22d66fb3b7dad2f46a36f08f84533725df20fcb683d9946f4081d3e7ab129bfdb3e634b2069456ac518d9413423613c49f6d290995bd13817dfae964b5461de755bab0620ff4a6b1864fdbf840728d06215a9fcdff32835839589ee8eb8a274d4bfabcc9367ea8d9a220d23a38febaac479c9b08809d4c42e35a31054173a1735694244e4f6d1c9acccd775ddf2ab2b0ce8a3fbf7f3a1e81ea001e3b5d709affd604da9d10f9cfbf31e7546ebc72f9f7176be3df715c9376c42d6575c95b13bee272eaef1fdb723ee2eaa426ecfcb9487c58bfd47525be682f820cbbcf0d53088803c541f83fb49a0908efa8625949796e22c610dbb0acc1442f1331d0690988e206af9d2d10ed9c7ef29ad921aaf31e59f8be57688d4b8c8da74c04f0e78ddbaf74ca60fff14d40f22af025b3a6dce885d11338449e2bfa5d0b9f41a2d45fb95ea05c887732a4b68d5da43d187b8649fc54b7bb03622a1ebc72efbbd81919cebdfaedfff42a36c2601ff47266e975111fdd4e80c0b1de21f8b2721a056b4ba084ffa54908e9d3f576ae7110dcb9cbdde496abd934150feb8eb20044f1d8e023dca12407ac9493b2bad1c45b7a5b5fc66d2295bc76bd1a0b767fe14dfb127360198cfda0420509a181a9872f0c890a47d9c6298a7d41f9f5438807f1ddf93afbfb75211b355a273c253fc507d91847acfc6e9626db71d8f9e2b6b25fe2820fee74eb74d1ebc0879952117937786130f7c301ccfbe39925df3fcc251b48cfaebccb82a274fb2b4335b226e99044e012bd7bcdf9e104e87f412e33487e135e5ba56b6c86ed47017a8ca7e20d5e512270ced2c52df16931857daa25b0ae9ebfa9a9206c076f96d5569455ad02740f0f3ef9efbab171d98999774434079f8402e729f853905414175d30ae8dc5b5511830ea0ead083a061c6b51ef5f122757f9a1219894f8bacedac6963b69ab40b67fdf017d7b6f233930eccc0b59bab0e5a1a9aac029ebcc3b1f96bd2b49ba194bb6bebbfcb4947e3e8e47ecfbb3afc9a3aefd60dbfe1478f799dbc5c2bae5e61b8faa08863b34a15653dc113d437a237873171eb1d70ba720ab300ae037256fd2db7a275a57cbe62d7f364bc7b78742938b1f136aaef0ebd656d707cae3f3111702182b148a561799b99472b8bfe2b89d97e89bc1410ff220b882884a1edcaad85dd7cac7327c619df3c3bfbbbb14dec85aaa52d481625b0256cd037044ffd25991de03a1dfc470fce162e33ca2b1f25c9debee6eb91bb06227c98ca2355aba4661eb6cfb0b8cd4f34012bb3b4ecf6789b0d28f8a6a357f6caad3f9ae949c2aa3dd439e754f50fc1df8f982092b258459d04d9dfb6a7b644d70f34debffcb20995bb3c8880fa9ac7d1a408e709d63bf85965643baa1fe9d681284bd9a6dc38c826f8be1f787d8498d07856a78c3fed7bffbb286aaaa42e135e90696e3029ef47fd7398440469481643bb6a789c1852081463b93b358f80deb3720b7f54ee794cc9ed3f9d993386d2ccf4b1b8fd2d4d00a51fd14a036a68b71c1f6b9b27dc6bbd0e543e5095768eb64f8b1653ffd7ebe2ce74b4bb53c036722248d16d135f28c3ff9526e53a07d46f427360ccf955f48a2074daa864353bf9b4016140a2532f5d26e5b66bb689a1f98e168f8bfeab46d19a20657d881f8d3d66ecdba9e49ac2089f97ea455b85c9fb1f1287d1e5f433bea4d86640a7cbfe6d2738d4f2f0ba0349398c93d58addb54ede7e73782f39f50238084ab1c1863bec4db4aef1b3553b4d8b68165f1c2db04b9d363731dac951b8623902376f041a723549ec0d32404b5569ffd300219cd7c1122b512ef9db284962982faae2c12cfa0faf9e1f044dbd1d64001384848d6369b32231c6aa4178b42c9ffaef8ee0c300708950ed574b9ef60b459834fd4d7fddf4ed333fd2ca13f2fe803f4bc14fe88969503929c646d509aa70fa6a3802231e7587054ce597886185f0cbc1c448c549ccc2f00efc3a7764aba326235dc5aed792fb3ced4ecded08dbb0a1ca7ca5bbbd71a6ab3169c958ccaf06cce8a55e396c7992e8975b227757a344c5226b7135ef67ef599c11d319cccc8502843cfecbcc83457caf1e1fdfcd27e8638f6735d3e7bb6738a6cdcade5b10fed80b7a8ec56ffd797863dea9cdc64aa460bd0264248af8ccc1208bad738f8cac10573c7ec5ea01dd6a7ebf9a85d86a43df99a7d7d1aec0570a111bbbe4be04af10a0957d990eae188697f540461672d84bcda46e53f481ff0be892e3099facdabf635d0379a378c730ed1d44b78ea133b032d91b50de6e6e4b6359b212117696d443b509663c44c3c8c542285ee96d63ac2fe9b8e0e68070f65a2b5ed4425eb59e64f54b2b924e7e8bed2c493b1c748ced399db68ccae6fe9654c9aa7afb5d1a013740fb5bfb4897fa9b1945bc274163c220a8ebc05bb54afffbe683f676ecca2a0f3a3fd08862c8bc52e2166d3a41972d76b978e88fcdf4961ef23d7d06b2de541a09192f61fe4ae33752049c787b866c502af7cc2c4cc9135cfea0a26d6e34e9bc42cc6f33ad809eb714bf5c1857f2ecc8233adbed22e6c05b28c2e3bf650e195a676d16a02d43df294b00be2cc65f60e226d159d6c34d0a49ed309dc18e993757eb64b9f13ac930d6b1e49b7bd8bf122e777785beed54c4732d58aa218e8433d1cfb0ec7309cf8d454e720b74a99641b714e20365dbd2e2cd130f35c2f980f830ad4d22a418c237a0aba412f0e249a51d45b84b9c2b9f5be338bb3f46621cb1ea870d9481a82a2e691eedad797b9c65d2773984b54b71b1c0e1ee4f56983bce0a32dbfa45e2ba87d5836ef58c67b89bee580f89ad5b52c7a88d597b08ed77ca7b3c68408b8afad1d4dcef4648c75498c0bfb4d6a118a97c4cf0aad14b7f487f01ae545435cf35506e8f660855a23367553d78bbc722f71cb09a3e8c18ad6a7729b6fef75f329f85ee7b08800ba7c88d80803b54d21765fa9ce4295bdf1b9e5adb60fc4157503ba0e8e3baf6e875ef5639cc1fffb2bdfbe9cc8425642817f9065e9d3d61878c47d3840da33104655e1deba9a16fbcda03d0a90123300023ca46d734adf0a17e626ae81d6915b89b354eac9ef131a4a314bada93b543bfdb91bd0220cf5bc4535c7c7927f049e07a124f9b05e7ebf2eff38d882b20ff24005fd02adbdd65c989144703e930c7bcca446ba7c323b28ab6e914b33467b14442062d81297391c82bd74ff3f1c875ff85daa15831c933277a115fab8f57da9362c88bd9cc1bb01f3903348592bcd222bf416917fd7eb00970cf2146f275dcf52fdc3291951e012e8fdf59fed6f778ddbfcad13092af8ec543c8be882be81f42e9fbd296a9bfad431cfa9d4ca18091d76577fe75c32d289e106388af899618651d6fab99062b439d335cb30e8bd04dcc1af4b13999692a946e5ca2fc46f15296028eb87558c0418d00a93d2ba9cf40065f84ac7db89e84b3fe88ac5818ab2a9441c29d3a0158f27c7de3fb6cbf3f211c6efdc02489a67e392927cfa9c1d21"}, {@broadcast, @broadcast, 0xbb, "25ae5c27d48dc0a26a5a8ca4206e50cef43319c6be16a031ef3c13db27508f4e5c7cb5cfe89c0574758938de7136339751fbd6777ba88bf210ed81c47b52865c64aeb41a87a6e992cd1562fc89b031340d0fb90fad42663e2036a6e7d4babe3e7b492c408a4b4a5e80244adbbba8aa11ebb5c715787d758420056457a461d98e33b09c0259d8b676220d6a782cc924b7050b5fc89479df782dc111fd489acda2762f7c370d2080581fbca9874b4e911b1f27694401d4d4d17e8eb2"}]}}, @NL80211_ATTR_FRAME={0xa02, 0x33, @data_frame={@no_qos=@type11={{}, {}, @broadcast, @device_b, @broadcast}, @a_msdu=[{@device_b, @broadcast, 0xdf, "a80fcbbdd4cf2e6872682a99db0ab9f34f993164a0f4a36c96301294b930d90c1a40753fec318d79f068c5f040a369a6ae007d92d759b0734354ae9442295397309e3f0e279091178fa6be2bb0051c93aeedf30958f9850d1b60fe376e0790a5a1fd7fecd673b9eddaeca250ecfa6727b7bd8cbd92c672c444acb4ce40e32d6e723c15b799fce419620f6d287d6cc1aa52b1fd11ce341f5839f336c88be0b9f99c9311eda4ac9b58b5288fc771b8a30d3b6f4c7d48de2771b96db1649f712e08245ee4ee444b5e5a8b5f7c2c127b7561c25d27c56f61419e6f63126b8f85df"}, {@device_a, @device_a, 0x3, "7f7a1d"}, {@device_a, @device_a, 0x2f, "0233aa297f648784eeb263b7490f02f2102749d9e4f0d2b663c5fdfef723dc6bee5c69c7f9c4723e902ceaf88f905d"}, {@device_b, @device_a, 0xfb, "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"}, {@device_a, @broadcast, 0x77f, "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"}]}}]}, 0x1eb0}}, 0x0) 15:39:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') read$usbmon(r0, &(0x7f0000002080)=""/4103, 0x1007) 15:39:52 executing program 3: r0 = epoll_create(0x2000a2) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0xfffffff7) epoll_wait(r0, &(0x7f0000001880)=[{}], 0x1, 0x20030) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 15:39:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:55 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000080)) 15:39:55 executing program 1: r0 = epoll_create(0x4) epoll_wait(r0, &(0x7f0000001880)=[{}], 0x1, 0x20030) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x90000000}) 15:39:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') read$usbmon(r0, 0x0, 0x0) 15:39:55 executing program 3: r0 = epoll_create(0x2000a2) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0xfffffff7) epoll_wait(r0, &(0x7f0000001880)=[{}], 0x1, 0x20030) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 15:39:55 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/nf_conntrack\x00') read$usbmon(r0, 0x0, 0x0) 15:39:55 executing program 0: ustat(0x4, 0x0) 15:39:55 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') read$usbmon(r0, 0x0, 0x0) 15:39:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@loopback, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@local}, 0x0, @in6=@local}}, 0xe8) 15:39:56 executing program 2: r0 = socket(0x11, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000d40)=[{{&(0x7f0000000580)=@nfc_llcp={0x27, 0x3, 0x0, 0x0, 0x0, 0x0, "7cbc7aedbd71dd7eda747969e55f59df786eb152d720b35dfae4d1f1a11b3a95473b4cdec7cce8aa5165f813d12a67baa2f5189da0d85ba5ad7e1320b499fe"}, 0x80, 0x0}}], 0x1, 0x0) 15:39:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x2710}, 0x10) 15:39:56 executing program 5: r0 = socket(0xa, 0x1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x24000800) 15:39:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:39:58 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x300000, 0x10001, 0x10000000}, 0x10) 15:39:58 executing program 5: r0 = socket(0xa, 0x1, 0x0) bind$packet(r0, 0x0, 0x0) 15:39:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) 15:39:58 executing program 3: r0 = epoll_create(0x2000a2) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0xfffffff7) epoll_wait(r0, &(0x7f0000001880)=[{}], 0x1, 0x20030) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 15:39:58 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x1) 15:39:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000002b40)={0xa, 0x0, 0x0, @dev}, 0x1c) 15:39:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004280)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 15:39:58 executing program 0: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x4000) 15:39:59 executing program 2: request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='][}\x00', 0xffffffffffffffff) 15:39:59 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="a7", 0x1}], 0x1}, 0x0) clock_gettime(0x0, &(0x7f00000046c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004540)=[{{&(0x7f0000000080)=@tipc=@name, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000140)=""/148, 0x94}}, {{&(0x7f0000000340)=@hci, 0x80, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/113, 0x71}], 0x1, &(0x7f00000002c0)=""/7, 0x7}}, {{&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001840)=[{&(0x7f00000004c0)=""/33, 0x21}, {&(0x7f0000000500)=""/189, 0xbd}, {&(0x7f00000005c0)=""/246, 0xf6}, {&(0x7f00000006c0)=""/69, 0x45}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/154, 0x9a}, {&(0x7f0000001800)=""/3, 0x3}], 0x7}}, {{&(0x7f00000018c0)=@alg, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001940)=""/72, 0x48}, {&(0x7f00000019c0)=""/133, 0x85}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/204, 0xfffffffffffffd27}], 0x4, &(0x7f0000002bc0)=""/252, 0xfc}, 0x80}, {{&(0x7f0000002cc0)=@hci, 0x80, &(0x7f0000002e80)=[{&(0x7f0000002d40)=""/132, 0x84}, {&(0x7f0000002e00)=""/101, 0x65}], 0x2, &(0x7f0000002ec0)=""/166, 0xa6}, 0x60}, {{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000002f80)=""/185, 0xb9}, {&(0x7f0000003040)=""/115, 0x73}, {&(0x7f00000030c0)=""/26, 0x1a}, {&(0x7f0000003100)=""/160, 0xa0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/175, 0xaf}, {&(0x7f0000004280)=""/195, 0xc3}, {&(0x7f0000004380)=""/99, 0x63}], 0x8, &(0x7f0000004480)=""/133, 0x85}}], 0x6, 0x102, &(0x7f0000004700)={0x0, r2+10000000}) 15:39:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000180)="b3d6b9000000003729679e71693955193a374c00", 0xffffffffffffff20, 0x0, 0x0, 0x0) recvmmsg$unix(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000001f40)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 15:40:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:01 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) 15:40:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) 15:40:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f00000002c0)) 15:40:01 executing program 3: r0 = epoll_create(0x2000a2) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0xfffffff7) epoll_wait(r0, &(0x7f0000001880)=[{}], 0x1, 0x20030) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 15:40:01 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000000)) 15:40:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x108) 15:40:02 executing program 0: shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x4000) 15:40:02 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') read$usbmon(r0, &(0x7f00000010c0)=""/4107, 0x100b) 15:40:02 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)) 15:40:02 executing program 5: r0 = epoll_create(0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x20000000}) 15:40:02 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) 15:40:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:04 executing program 2: r0 = socket(0x11, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000d40)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000d00), 0x42}}], 0x1, 0x0) 15:40:04 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') r1 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 15:40:04 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/sockstat\x00') read$usbmon(r0, 0x0, 0x0) 15:40:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000880)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=[@flowinfo={{0x14}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @empty}}}}], 0x40}}], 0x1, 0x0) 15:40:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x20) 15:40:05 executing program 3: sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x7000) 15:40:05 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 15:40:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback, 0x7}, 0x1c, &(0x7f0000000100)=[{&(0x7f00000001c0)='!', 0x1}], 0x1}, 0x8001) 15:40:05 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="a7", 0x1}, {&(0x7f0000000340)="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", 0xec0}], 0x2}, 0x0) 15:40:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000880)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1, 0x8001}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=[@flowinfo={{0x14}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @empty}}}}], 0x40}}], 0x1, 0x0) 15:40:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x801, 0x0, 0x0, {}, [@NFQA_CFG_MASK={0x8}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_FLAGS={0x8}]}, 0x2c}}, 0x0) 15:40:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:08 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000004cc0)={'batadv_slave_0\x00', 0x0}) sendmmsg(r0, &(0x7f0000008100)=[{{&(0x7f0000000580)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "7cbc7aedbd71dd7eda747969e55f59df786eb152d720b35dfae4d1f1a11b3a95473b4cdec7cce8aa5165f813d12a67baa2f5189da0d85ba5ad7e1320b499fe"}, 0x80, 0x0}}, {{&(0x7f0000004d00)=@xdp={0x2c, 0x0, r1}, 0x80, 0x0}}], 0x2, 0x0) 15:40:08 executing program 2: r0 = socket(0xa, 0x1, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4011) 15:40:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}, 0x8001) 15:40:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack_expect\x00') read$usbmon(r0, 0x0, 0x0) 15:40:08 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x3}) 15:40:08 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/if_inet6\x00') read$usbmon(r0, 0x0, 0x0) 15:40:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000040)={'veth1_to_batadv\x00', @ifru_flags}) 15:40:08 executing program 5: io_setup(0x1, &(0x7f0000000340)) io_setup(0x0, &(0x7f0000000340)) 15:40:08 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0xfffffe4d}, 0x0) 15:40:08 executing program 2: r0 = socket(0x11, 0x2, 0x0) sendmmsg(r0, &(0x7f0000008100)=[{{&(0x7f0000000580)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "7cbc7aedbd71dd7eda747969e55f59df786eb152d720b35dfae4d1f1a11b3a95473b4cdec7cce8aa5165f813d12a67baa2f5189da0d85ba5ad7e1320b499fe"}, 0x80, 0x0}}, {{&(0x7f0000004d00)=@xdp, 0x80, 0x0}}], 0x2, 0x0) 15:40:08 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') read$usbmon(r0, &(0x7f0000000080)=""/4096, 0x1000) 15:40:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000001880)=""/102388, 0x18ff4}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x0, 0x0, 0x0, 0x4, 0x37c5, 0xffff}, 0x20) 15:40:11 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stat\x00') read$usbmon(r0, 0x0, 0x0) 15:40:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 15:40:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}, 0x0) 15:40:11 executing program 5: r0 = epoll_create(0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x20000000}) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x5) 15:40:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000)={0x77359400}, 0x10) [ 2264.588604][T27994] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 2264.616922][ T22] kauditd_printk_skb: 32 callbacks suppressed 15:40:11 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000940), 0xa2480, 0x0) 15:40:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f00000002c0)=0x9fa6) 15:40:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="a7", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001100)=[{{&(0x7f0000000440)=@alg, 0x80, 0x0, 0x0, &(0x7f0000000a40)=""/123, 0x7b}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10022, &(0x7f00000011c0)={0x0, 0x3938700}) 15:40:11 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') read$usbmon(r0, 0x0, 0x0) [ 2264.616935][ T22] audit: type=1326 audit(1633448411.101:85869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27986 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f380f3738d9 code=0x0 15:40:11 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/if_inet6\x00') read$usbmon(r0, &(0x7f0000002080)=""/4103, 0x1007) 15:40:14 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000001880)=""/102388, 0x18ff4}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001100)='./file0\x00', 0x0, 0x0, &(0x7f0000004500), 0x0, &(0x7f0000004580)={[{}]}) 15:40:14 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "898192335cc1566a221f8600247a0823910b18c2a90acbb524f62df253a6c4b2b5b6f20f79083ea2f7f29eb0016079dcc43e0000000000000300"}, 0x48, 0xfffffffffffffffe) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="8a", 0x1, 0xfffffffffffffffd) keyctl$unlink(0x9, r0, r1) 15:40:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000076c0)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty, 0x1b5}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x0) 15:40:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000140), 0x4) 15:40:14 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') read$usbmon(r0, &(0x7f00000010c0)=""/4107, 0x100b) 15:40:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000880)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @empty}}}}], 0x28}}], 0x1, 0x0) 15:40:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000091c0), r0) 15:40:14 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000340)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 15:40:14 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="8a", 0x1, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 15:40:14 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) 15:40:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004280)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @private0}, 0x1c, 0x0}}], 0x2, 0x0) 15:40:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000001880)=""/102388, 0x18ff4}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 15:40:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 15:40:17 executing program 3: ustat(0x4, &(0x7f0000000000)) 15:40:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "51d38c"}}) 15:40:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000280)={0x11, 0xc, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 15:40:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004280)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) 15:40:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'veth0_to_bridge\x00', &(0x7f0000000080)=@ethtool_eeprom={0xb}}) 15:40:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x10, 0x0, 0x0, 0x0) 15:40:17 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) 15:40:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00') read$usbmon(r0, 0x0, 0x0) 15:40:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000140)={'veth1_virt_wifi\x00', @ifru_mtu}) 15:40:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000001880)=""/102388, 0x18ff4}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:20 executing program 3: r0 = epoll_create(0x4) epoll_wait(r0, &(0x7f0000001880)=[{}], 0x1, 0x20030) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0xbeacd59ee9acd9f6}) 15:40:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') read$usbmon(r0, &(0x7f0000002080)=""/4103, 0x1007) 15:40:20 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/rt_cache\x00') read$usbmon(r0, &(0x7f0000000080)=""/4096, 0x1000) 15:40:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f0000000280)={0x11, 0xc, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 15:40:20 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/bus/input/devices\x00', 0x0, 0x0) 15:40:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000180)="b3d6b9000000003729679e71693955193a374c00", 0xffffffffffffff20, 0x0, 0x0, 0x0) recvmmsg$unix(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, &(0x7f0000003000)=[{0x0}, {&(0x7f0000001f40)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0) 15:40:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="a7", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000005d80)=[{{&(0x7f0000003b40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000004bc0)=[{&(0x7f0000003bc0)=""/4096, 0x1000}], 0x1, &(0x7f0000004c00)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000005e00)={0x0, 0x989680}) 15:40:20 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, &(0x7f0000000140)) 15:40:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/if_inet6\x00') read$usbmon(r0, &(0x7f0000002080)=""/4103, 0x1007) read$usbmon(r0, 0x0, 0x0) 15:40:20 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 15:40:20 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$unix(r1, &(0x7f0000000040), 0xa) 15:40:23 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000001880)=""/102388, 0x18ff4}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:23 executing program 2: r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) bind(0xffffffffffffff9c, &(0x7f0000000180)=@in={0x10}, 0x10) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0, 0x0) openat$ptmx(0xffffff9c, &(0x7f0000000140), 0x8000, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x100) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x10}, 0x10) sendto$inet(r2, &(0x7f00000002c0)="b0a75245f653e27e11382cce34d404c4cf2205963cd1558352f1f2a2309661a32bc649d950854968cd7ba366b4db9fc0ef249368040000000000000077c8f1a7bdf17e9103b43eda44ef49243074c5d9d7e154432ae66b695ae0f250b79b60a19df9630d4a3b27a0b061d6abd6cfd5ae07e6806a48ffd35c0cdc456135cfb50f4360c543a0a214564e0bdb434d6e6f8358aed341cab0e3e4b47db45582a7d07e103722825a50e7e6ece5fcd55cec1a64d100"/188, 0xbc, 0x180, &(0x7f0000000100)={0x10}, 0x10) 15:40:23 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x1c, 0x1c, 0x3}, 0x1c) 15:40:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000), 0x10) 15:40:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') read$usbmon(r0, 0x0, 0x0) 15:40:23 executing program 5: sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) munmap(&(0x7f0000400000/0xc00000)=nil, 0xc00000) 15:40:23 executing program 5: getitimer(0x2, &(0x7f0000000100)) 15:40:23 executing program 0: r0 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, &(0x7f0000000d40)=ANY=[], 0x18) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x1c, 0x1c, 0x3}, 0x1c) 15:40:23 executing program 3: r0 = socket(0x1c, 0x5, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)=@in={0x10}, 0x10) 15:40:23 executing program 1: r0 = socket(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) 15:40:23 executing program 5: r0 = socket(0x1c, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c) 15:40:23 executing program 2: r0 = socket(0x11, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000300)) 15:40:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000001880)=""/102388, 0x18ff4}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:26 executing program 3: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8930, &(0x7f0000000000)='ip6gre0\x00') 15:40:26 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 15:40:26 executing program 0: perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:40:26 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x20b000) 15:40:26 executing program 2: perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:40:26 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 15:40:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x1100, 0x806000) 15:40:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x1100, 0x806000) 15:40:26 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:26 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_type(r0, &(0x7f0000000000), 0x20b000) 15:40:29 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x1100, 0x806000) 15:40:29 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000ac0)='ns/cgroup\x00') 15:40:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x1100, 0x806000) 15:40:29 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x1100, 0x806000) 15:40:29 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x1100, 0x806000) 15:40:29 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:29 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x1100, 0x806000) 15:40:29 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:29 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x1100, 0x806000) 15:40:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x1100, 0x806000) 15:40:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:32 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:32 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x1100, 0x806000) 15:40:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) 15:40:32 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x1100, 0x806000) 15:40:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:32 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) 15:40:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x1100, 0x806000) 15:40:32 executing program 3: io_setup(0x2, &(0x7f0000000140)=0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0, 0x0, 0x100000001}]) 15:40:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0xb, 0x6, 0x801}, 0x14}}, 0x0) 15:40:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000680)="66530700ae897094e7b126b097eaa769be6d05c481d34e777d114b654b499374a8db38f8c44f7b7d9ce402006f45958d4b7a3dfcc816c467c669aab0e05485b4ff8593d90900000000001b002ebf4307cd94e429e638796702f7c3aae0051aeb45ac8958f12d5493a0b90b2beab487967a038c686d0c518c430557cd9a2072b2b1376739ff810a68e6438054923abdbacf063aadf045d5e0b67c5fad8f9a72e26408f837a4673d8f98077cf177dedfb5cb1d57209e9f5e710c668323f39859238b4c5e833adb11f66fe54f83912d7abfbc85347f0450b0c3382e4d1e8080a035b9", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:40:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:35 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000680)="66530700ae897094e7b126b097eaa769be6d05c481d34e777d114b654b499374a8db38f8c44f7b7d9ce402006f45958d4b7a3dfcc816c467c669aab0e05485b4ff8593d90900000000001b002ebf4307cd94e429e638796702f7c3aae0051aeb45ac8958f12d5493a0b90b2beab487967a038c686d0c518c", 0x78}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:40:35 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) 15:40:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:35 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) close(r1) ppoll(&(0x7f00000000c0)=[{r0}, {r1}], 0x2, 0x0, 0x0, 0x0) 15:40:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 15:40:35 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000a", 0x29}, {&(0x7f0000013900)="111fc0d901000000803a0900", 0xc, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chroot(&(0x7f00000001c0)='./file0\x00') r1 = openat(r0, &(0x7f0000000340)='./file0\x00', 0x20c440, 0xc5) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x800a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@initdev, @in=@private}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000006fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002540)=[{0x0}], 0x1, &(0x7f0000002580)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000002680), 0x6e, &(0x7f0000002740)=[{0x0}], 0x1, &(0x7f0000002780)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f00000040c0)=[{0x0}, {0xfffffffffffffffe}, {&(0x7f0000003f80)=""/18, 0x12}, {&(0x7f0000003fc0)=""/183, 0xb7}, {0x0}], 0x5, &(0x7f0000006380)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{0x0, 0x0, &(0x7f0000006940)=[{&(0x7f0000006540)=""/239, 0xef}, {&(0x7f0000004280)=""/54, 0x36}, {0x0}], 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="3452de40503e9132cdf352b323c2d8cd90643146b15d37ad1a3ab5388fa0e9f776c302f31ace040a226f0339ba8ea75dc0c877e45232262f00"/67, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x38}}], 0x5, 0x0, &(0x7f0000007180)={0x77359400}) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d280)=[{{0x0, 0x0, 0x0}}, {{&(0x7f000000ac00), 0x6e, 0x0}}, {{&(0x7f000000b140)=@abs, 0x6e, &(0x7f000000b640)=[{0x0}, {&(0x7f000000b580)=""/153, 0x99}], 0x2, &(0x7f000000b6c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa8}}, {{&(0x7f000000b800), 0x6e, &(0x7f000000cb80)=[{&(0x7f000000b880)=""/119, 0x77}, {&(0x7f000000b900)=""/217, 0xd9}, {&(0x7f000000ba00)=""/179, 0xb3}, {&(0x7f000000cac0)=""/170, 0xaa}], 0x4, &(0x7f000000cc00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}}], 0x4, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x24b6422, &(0x7f0000000500)={[{}]}) creat(&(0x7f0000000d00)='./file2\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f00000002c0)=[{0x0, 0x0, 0x8}, {&(0x7f0000000440)="a0c78139afbf37d9e76acb10bf203bd9324604f790cac284570a832da6f3e83ac2709bea92cd3ca448b0e6ddc06265b6ac4b442a83e60f84e3cf4c863057cff853bed4ef9bb705fca94dfd9d9aa07ab32cf2cf1a8a7fc5b316c92341c3121b7371196a254503b8", 0x67, 0xbf}], 0x101000, &(0x7f00000004c0)={[{@huge_never}, {@huge_always}, {@size={'size', 0x3d, [0x38]}}, {@size={'size', 0x3d, [0x31, 0x67]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x15, 0x67, 0x25, 0x25, 0x36, 0x0, 0x0]}}, {@mpol={'mpol', 0x3d, {'default', '=relative'}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x31, 0x6d]}}, {@huge_within_size}], [{@uid_eq}]}) openat(0xffffffffffffffff, 0x0, 0x0, 0x10) umount2(&(0x7f0000000d80)='./file0\x00', 0x8) 15:40:35 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:35 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/nfs', 0x90000, 0x0) 15:40:35 executing program 1: getresuid(&(0x7f0000000080), &(0x7f00000000c0), 0x0) 15:40:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 15:40:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x300}, 0x0) 15:40:38 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:38 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000140)=@buf={0x0, &(0x7f0000000040)}) 15:40:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:38 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000940), 0x44000, 0x0) 15:40:38 executing program 1: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000140)={0x10000010}) 15:40:38 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000380)) 15:40:38 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE(r0, 0x125d, &(0x7f00000015c0)) 15:40:38 executing program 1: socket$inet6(0xa, 0x1, 0x2) 15:40:38 executing program 3: clock_gettime(0x0, &(0x7f0000000180)={0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={r0}) 15:40:38 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:38 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000a", 0x29}, {&(0x7f0000013900)="111fc0d901000000803a0900", 0xc, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chroot(&(0x7f00000001c0)='./file0\x00') r1 = openat(r0, &(0x7f0000000340)='./file0\x00', 0x20c440, 0xc5) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x800a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@initdev, @in=@private}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000006fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002540)=[{0x0}], 0x1, &(0x7f0000002580)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000002680), 0x6e, &(0x7f0000002740)=[{0x0}], 0x1, &(0x7f0000002780)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f00000040c0)=[{0x0}, {0xfffffffffffffffe}, {&(0x7f0000003f80)=""/18, 0x12}, {&(0x7f0000003fc0)=""/183, 0xb7}, {0x0}], 0x5, &(0x7f0000006380)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{0x0, 0x0, &(0x7f0000006940)=[{&(0x7f0000006540)=""/239, 0xef}, {&(0x7f0000004280)=""/54, 0x36}, {0x0}], 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="3452de40503e9132cdf352b323c2d8cd90643146b15d37ad1a3ab5388fa0e9f776c302f31ace040a226f0339ba8ea75dc0c877e45232262f00"/67, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x38}}], 0x5, 0x0, &(0x7f0000007180)={0x77359400}) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d280)=[{{&(0x7f0000009940), 0x6e, 0x0}}, {{&(0x7f000000ac00), 0x6e, 0x0}}, {{&(0x7f000000b140)=@abs, 0x6e, &(0x7f000000b640)=[{0x0}, {&(0x7f000000b580)=""/153, 0x99}], 0x2, &(0x7f000000b6c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa8}}, {{&(0x7f000000b800), 0x6e, &(0x7f000000cb80)=[{&(0x7f000000b880)=""/119, 0x77}, {&(0x7f000000b900)=""/217, 0xd9}, {&(0x7f000000ba00)=""/179, 0xb3}, {&(0x7f000000cac0)=""/170, 0xaa}], 0x4, &(0x7f000000cc00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}], 0x4, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000d00)='./file2\x00', 0xc1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f00000002c0)=[{0x0, 0x0, 0x8}, {&(0x7f0000000440)="a0c78139afbf37d9e76acb10bf203bd9324604f790cac284570a832da6f3e83ac2709bea92cd3ca448b0e6ddc06265b6ac4b442a83e60f84e3cf4c863057cff853bed4ef9bb705fca94dfd9d9aa07ab32cf2cf1a8a7fc5b316c92341c3121b7371196a254503b8", 0x67, 0xbf}], 0x101000, &(0x7f00000004c0)={[{@huge_never}, {@huge_always}, {@size={'size', 0x3d, [0x38]}}, {@size={'size', 0x3d, [0x31, 0x30, 0x67]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x15, 0x67, 0x25, 0x25, 0x36, 0x0, 0x0]}}, {@mpol={'mpol', 0x3d, {'default', '=relative'}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x31, 0x6d]}}, {@huge_within_size}], [{@uid_eq}]}) openat(0xffffffffffffffff, &(0x7f0000000d40)='.\x00', 0x0, 0x10) umount2(&(0x7f0000000d80)='./file0\x00', 0x8) [ 2292.096555][T28478] loop2: detected capacity change from 0 to 4096 [ 2292.154831][T28478] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 2292.183596][T28478] EXT4-fs (loop2): re-mounted. Opts: (null). Quota mode: writeback. 15:40:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:41 executing program 1: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x300, 0x0) 15:40:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:41 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:41 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000a", 0x29}, {&(0x7f0000013900)="111fc0d901000000803a0900", 0xc, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chroot(&(0x7f00000001c0)='./file0\x00') r1 = openat(r0, &(0x7f0000000340)='./file0\x00', 0x20c440, 0xc5) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x800a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@initdev, @in=@private}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000006fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002540)=[{0x0}], 0x1, &(0x7f0000002580)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000002680), 0x6e, &(0x7f0000002740)=[{0x0}], 0x1, &(0x7f0000002780)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f00000040c0)=[{0x0}, {0xfffffffffffffffe}, {&(0x7f0000003f80)=""/18, 0x12}, {&(0x7f0000003fc0)=""/183, 0xb7}, {0x0}], 0x5, &(0x7f0000006380)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{0x0, 0x0, &(0x7f0000006940)=[{&(0x7f0000006540)=""/239, 0xef}, {&(0x7f0000004280)=""/54, 0x36}, {0x0}], 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="3452de40503e9132cdf352b323c2d8cd90643146b15d37ad1a3ab5388fa0e9f776c302f31ace040a226f0339ba8ea75dc0c877e45232262f00"/67, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x38}}], 0x5, 0x0, &(0x7f0000007180)={0x77359400}) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d280)=[{{&(0x7f0000009940), 0x6e, 0x0}}, {{&(0x7f000000ac00), 0x6e, 0x0}}, {{&(0x7f000000b140)=@abs, 0x6e, &(0x7f000000b640)=[{0x0}, {&(0x7f000000b580)=""/153, 0x99}], 0x2, &(0x7f000000b6c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa8}}, {{&(0x7f000000b800), 0x6e, &(0x7f000000cb80)=[{&(0x7f000000b880)=""/119, 0x77}, {&(0x7f000000b900)=""/217, 0xd9}, {&(0x7f000000ba00)=""/179, 0xb3}, {&(0x7f000000cac0)=""/170, 0xaa}], 0x4, &(0x7f000000cc00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}], 0x4, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000d00)='./file2\x00', 0xc1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f00000002c0)=[{0x0, 0x0, 0x8}, {&(0x7f0000000440)="a0c78139afbf37d9e76acb10bf203bd9324604f790cac284570a832da6f3e83ac2709bea92cd3ca448b0e6ddc06265b6ac4b442a83e60f84e3cf4c863057cff853bed4ef9bb705fca94dfd9d9aa07ab32cf2cf1a8a7fc5b316c92341c3121b7371196a254503b8", 0x67, 0xbf}], 0x101000, &(0x7f00000004c0)={[{@huge_never}, {@huge_always}, {@size={'size', 0x3d, [0x38]}}, {@size={'size', 0x3d, [0x31, 0x30, 0x67]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x15, 0x67, 0x25, 0x25, 0x36, 0x0, 0x0]}}, {@mpol={'mpol', 0x3d, {'default', '=relative'}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x31, 0x6d]}}, {@huge_within_size}], [{@uid_eq}]}) openat(0xffffffffffffffff, &(0x7f0000000d40)='.\x00', 0x0, 0x10) umount2(&(0x7f0000000d80)='./file0\x00', 0x8) 15:40:41 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000567c67"], 0x14}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r0) 15:40:41 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) 15:40:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, 0x1}, 0x90) [ 2294.944418][T28515] loop2: detected capacity change from 0 to 4096 15:40:41 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:41 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 15:40:41 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x3ff}, 0x4) [ 2295.000051][T28515] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 2295.036840][T28515] EXT4-fs (loop2): re-mounted. Opts: (null). Quota mode: writeback. 15:40:41 executing program 3: socket$inet6(0xa, 0x0, 0x10000) 15:40:44 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)={0x1ec4, 0x14, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x1001, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x4d, 0x1, "7e001640ebc8110e6819c52ef44e5e676c4548649b0266401fb0c5e859eb2dffb0485dd36cf360b71f3737c7784f46a87c85e587b5c1d05a0b6e42987f8a87cf75dd4fcf6e108b6269"}, @INET_DIAG_REQ_BYTECODE={0x9, 0x1, "39db335825"}, @INET_DIAG_REQ_BYTECODE={0xe4d, 0x1, "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"}]}, 0x1ec4}}, 0x0) 15:40:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:44 executing program 1: select(0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)) 15:40:44 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:44 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000a", 0x29}, {&(0x7f0000013900)="111fc0d901000000803a0900", 0xc, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chroot(&(0x7f00000001c0)='./file0\x00') r1 = openat(r0, &(0x7f0000000340)='./file0\x00', 0x20c440, 0xc5) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x800a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@initdev, @in=@private}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000006fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002540)=[{0x0}], 0x1, &(0x7f0000002580)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000002680), 0x6e, &(0x7f0000002740)=[{0x0}], 0x1, &(0x7f0000002780)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f00000040c0)=[{0x0}, {0xfffffffffffffffe}, {&(0x7f0000003f80)=""/18, 0x12}, {&(0x7f0000003fc0)=""/183, 0xb7}, {0x0}], 0x5, &(0x7f0000006380)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{0x0, 0x0, &(0x7f0000006940)=[{&(0x7f0000006540)=""/239, 0xef}, {&(0x7f0000004280)=""/54, 0x36}, {0x0}], 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="3452de40503e9132cdf352b323c2d8cd90643146b15d37ad1a3ab5388fa0e9f776c302f31ace040a226f0339ba8ea75dc0c877e45232262f00"/67, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x38}}], 0x5, 0x0, &(0x7f0000007180)={0x77359400}) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d280)=[{{&(0x7f0000009940), 0x6e, 0x0}}, {{&(0x7f000000ac00), 0x6e, 0x0}}, {{&(0x7f000000b140)=@abs, 0x6e, &(0x7f000000b640)=[{0x0}, {&(0x7f000000b580)=""/153, 0x99}], 0x2, &(0x7f000000b6c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa8}}, {{&(0x7f000000b800), 0x6e, &(0x7f000000cb80)=[{&(0x7f000000b880)=""/119, 0x77}, {&(0x7f000000b900)=""/217, 0xd9}, {&(0x7f000000ba00)=""/179, 0xb3}, {&(0x7f000000cac0)=""/170, 0xaa}], 0x4, &(0x7f000000cc00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}], 0x4, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000d00)='./file2\x00', 0xc1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f00000002c0)=[{0x0, 0x0, 0x8}, {&(0x7f0000000440)="a0c78139afbf37d9e76acb10bf203bd9324604f790cac284570a832da6f3e83ac2709bea92cd3ca448b0e6ddc06265b6ac4b442a83e60f84e3cf4c863057cff853bed4ef9bb705fca94dfd9d9aa07ab32cf2cf1a8a7fc5b316c92341c3121b7371196a254503b8", 0x67, 0xbf}], 0x101000, &(0x7f00000004c0)={[{@huge_never}, {@huge_always}, {@size={'size', 0x3d, [0x38]}}, {@size={'size', 0x3d, [0x31, 0x30, 0x67]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x15, 0x67, 0x25, 0x25, 0x36, 0x0, 0x0]}}, {@mpol={'mpol', 0x3d, {'default', '=relative'}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x31, 0x6d]}}, {@huge_within_size}], [{@uid_eq}]}) openat(0xffffffffffffffff, &(0x7f0000000d40)='.\x00', 0x0, 0x10) umount2(&(0x7f0000000d80)='./file0\x00', 0x8) 15:40:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:44 executing program 3: semctl$IPC_INFO(0x0, 0x0, 0x14, &(0x7f0000000180)=""/132) [ 2297.970771][T28561] loop2: detected capacity change from 0 to 4096 15:40:44 executing program 1: syz_open_procfs(0x0, &(0x7f0000000840)='setgroups\x00') 15:40:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="01"], 0x1c}}, 0x0) 15:40:44 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) [ 2298.026449][T28561] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 15:40:44 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 15:40:44 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000a", 0x29}, {&(0x7f0000013900)="111fc0d901000000803a0900", 0xc, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chroot(&(0x7f00000001c0)='./file0\x00') r1 = openat(r0, &(0x7f0000000340)='./file0\x00', 0x20c440, 0xc5) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x800a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@initdev, @in=@private}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000006fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002540)=[{0x0}], 0x1, &(0x7f0000002580)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000002680), 0x6e, &(0x7f0000002740)=[{0x0}], 0x1, &(0x7f0000002780)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f00000040c0)=[{0x0}, {0xfffffffffffffffe}, {&(0x7f0000003f80)=""/18, 0x12}, {&(0x7f0000003fc0)=""/183, 0xb7}, {0x0}], 0x5, &(0x7f0000006380)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{0x0, 0x0, &(0x7f0000006940)=[{&(0x7f0000006540)=""/239, 0xef}, {&(0x7f0000004280)=""/54, 0x36}, {0x0}], 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="3452de40503e9132cdf352b323c2d8cd90643146b15d37ad1a3ab5388fa0e9f776c302f31ace040a226f0339ba8ea75dc0c877e45232262f00"/67, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x38}}], 0x5, 0x0, &(0x7f0000007180)={0x77359400}) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d280)=[{{&(0x7f0000009940), 0x6e, 0x0}}, {{&(0x7f000000ac00), 0x6e, 0x0}}, {{&(0x7f000000b140)=@abs, 0x6e, &(0x7f000000b640)=[{0x0}, {&(0x7f000000b580)=""/153, 0x99}], 0x2, &(0x7f000000b6c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa8}}, {{&(0x7f000000b800), 0x6e, &(0x7f000000cb80)=[{&(0x7f000000b880)=""/119, 0x77}, {&(0x7f000000b900)=""/217, 0xd9}, {&(0x7f000000ba00)=""/179, 0xb3}, {&(0x7f000000cac0)=""/170, 0xaa}], 0x4, &(0x7f000000cc00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}], 0x4, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000d00)='./file2\x00', 0xc1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f00000002c0)=[{0x0, 0x0, 0x8}, {&(0x7f0000000440)="a0c78139afbf37d9e76acb10bf203bd9324604f790cac284570a832da6f3e83ac2709bea92cd3ca448b0e6ddc06265b6ac4b442a83e60f84e3cf4c863057cff853bed4ef9bb705fca94dfd9d9aa07ab32cf2cf1a8a7fc5b316c92341c3121b7371196a254503b8", 0x67, 0xbf}], 0x101000, &(0x7f00000004c0)={[{@huge_never}, {@huge_always}, {@size={'size', 0x3d, [0x38]}}, {@size={'size', 0x3d, [0x31, 0x30, 0x67]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x15, 0x67, 0x25, 0x25, 0x36, 0x0, 0x0]}}, {@mpol={'mpol', 0x3d, {'default', '=relative'}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x31, 0x6d]}}, {@huge_within_size}], [{@uid_eq}]}) openat(0xffffffffffffffff, &(0x7f0000000d40)='.\x00', 0x0, 0x10) umount2(&(0x7f0000000d80)='./file0\x00', 0x8) 15:40:44 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) [ 2298.270448][T28601] loop2: detected capacity change from 0 to 4096 15:40:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c}, 0x1, 0x0, 0x9effffff}, 0x0) 15:40:47 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) 15:40:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 15:40:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:47 executing program 2: syz_open_dev$vcsn(&(0x7f0000000040), 0x946b, 0x12f100) 15:40:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0xffffffc1, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000002e40)=[{{&(0x7f0000000100)=@l2tp6={0xa, 0x500, 0x0, @remote}, 0x80, 0x0}}, {{&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x80000, @empty}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x1260}}], 0x2, 0x0) sendmmsg(r0, &(0x7f0000002e40), 0x2, 0x0) 15:40:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:47 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0af605020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) 15:40:47 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) 15:40:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:47 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0xa4142) [ 2301.125434][T28644] loop3: detected capacity change from 0 to 1 [ 2301.190195][T28647] loop3: p2 < > p4 [ 2301.194577][T28647] loop3: p2 size 2 extends beyond EOD, truncated [ 2301.209973][T28647] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2301.233947][T28644] loop3: p2 < > p4 [ 2301.240465][T28644] loop3: p2 size 2 extends beyond EOD, truncated [ 2301.256770][T28644] loop3: p4 size 2097152 extends beyond EOD, truncated 15:40:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:50 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000580)) 15:40:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:50 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0af605020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) 15:40:50 executing program 1: socketpair(0x1, 0x0, 0x6, &(0x7f0000000180)) 15:40:50 executing program 1: socketpair(0x15, 0x800, 0x0, 0x0) 15:40:50 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:50 executing program 2: rt_sigaction(0x4, &(0x7f0000000080)={&(0x7f0000000000)="21cdc4a20191a4d50c000000c40379049af8ffffff79c462d128cbc4617210ee3e36400f2b51b7c153ac66c44265bd2366460f381ccfc481f9c5d857", 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000180)) [ 2304.013618][T28680] loop3: detected capacity change from 0 to 1 15:40:50 executing program 2: poll(&(0x7f0000000000)=[{}], 0x1, 0xfff) 15:40:50 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x5, 0x0, 0xc, 0x0, "8919f1c4ecb4f19739704366f0185a369320c1"}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0xd, 0x0, 0x0, 0x0, 0x0, "00e95d00000000000079000000008000"}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000440)={{}, 0x0, 0x4, @unused=[0x1, 0x80000000, 0x0, 0x8000], @subvolid=0x7ff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f00000003c0), 0x4) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x1f4) syz_open_procfs(0xffffffffffffffff, 0xfffffffffffffffe) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x36, &(0x7f0000000200)=ANY=[@ANYBLOB="bb05000000000000040109c2040000060d000100040100c20400000c19040100000000001f0000f900"/55], 0x38) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x2f, 0xfc, 0xcc, 0x3fffc0, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00', 0x700, 0x700, 0xf4, 0x30}}) [ 2304.102989][T28680] loop3: p2 < > p4 [ 2304.113733][T28680] loop3: p2 size 2 extends beyond EOD, truncated 15:40:50 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) [ 2304.157159][T28680] loop3: p4 size 2097152 extends beyond EOD, truncated 15:40:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:53 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0af605020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) 15:40:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:53 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={0x0}}, 0x0) 15:40:53 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) 15:40:53 executing program 1: socketpair(0x1, 0x0, 0xffffc14e, 0x0) 15:40:53 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:53 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x200002, 0x0) [ 2307.079408][T28736] loop3: detected capacity change from 0 to 1 15:40:53 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_proto_private(r0, 0x2, 0x0) 15:40:53 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:53 executing program 2: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x1ff}, 0x0, &(0x7f00000002c0)={0x77359400}, 0x0) [ 2307.160117][T28736] loop3: p2 < > p4 [ 2307.166133][T28736] loop3: p2 size 2 extends beyond EOD, truncated [ 2307.209561][T28736] loop3: p4 size 2097152 extends beyond EOD, truncated 15:40:56 executing program 2: epoll_create1(0x7577818a9558b33f) 15:40:56 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:56 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup2(r0, r0) accept4$packet(r1, 0x0, 0x0, 0x0) 15:40:56 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0af605020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) 15:40:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:56 executing program 2: r0 = eventfd(0x0) write$binfmt_elf32(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 15:40:56 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) [ 2310.071084][T28787] loop3: detected capacity change from 0 to 1 15:40:56 executing program 1: syz_read_part_table(0x0, 0x0, &(0x7f0000000140)) 15:40:56 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e40)='/sys/class/virtio-ports', 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x1f) [ 2310.129335][T28787] loop3: p2 < > p4 [ 2310.135773][T28787] loop3: p2 size 2 extends beyond EOD, truncated [ 2310.156912][T28787] loop3: p4 size 2097152 extends beyond EOD, truncated 15:40:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:56 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:56 executing program 1: capset(&(0x7f00000001c0)={0x20071026}, 0x0) [ 2310.337430][ T22] audit: type=1326 audit(1633448456.815:85870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28822 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f5c2ae9a8d9 code=0x0 [ 2311.154068][ T22] audit: type=1326 audit(1633448457.635:85871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28822 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f5c2ae9a8d9 code=0x0 15:40:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:40:59 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e40)='/sys/class/virtio-ports', 0x0, 0x0) flock(r0, 0x5) 15:40:59 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x80, 0x0) 15:40:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:40:59 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:59 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)) 15:40:59 executing program 1: r0 = epoll_create1(0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/cgroup', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 15:40:59 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$9p(r0, 0x0, 0xfffffd92) 15:40:59 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 15:40:59 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xa1) 15:40:59 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:40:59 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x10000018}) 15:41:02 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:41:02 executing program 3: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000001040), 0xffffffffffffffff) 15:41:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000003b80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000003780)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000003b00)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}}], 0x2, 0x0) 15:41:02 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:41:02 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB=','], 0x42c}}, 0x0) 15:41:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:02 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000070000010000000000000000000000000a50000000090a0300000000000000000000000008080005400000002a090006"], 0x78}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400000000010000000000000000000000000000300001002c00010014"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x21, 0x1f}, @mss, @mss], 0x3) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 2316.128853][T28891] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28891 comm=syz-executor.2 15:41:02 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 15:41:02 executing program 2: keyctl$join(0x1, 0x0) keyctl$join(0x1, 0x0) 15:41:02 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:41:02 executing program 3: socket(0x11, 0x2, 0x0) socket(0x11, 0x2, 0x0) [ 2316.215381][T28901] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 2316.223555][T28901] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. 15:41:02 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x597101, 0x0) [ 2316.288461][T28912] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 2316.296579][T28912] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. 15:41:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 15:41:05 executing program 3: io_setup(0x3, &(0x7f0000000480)=0x0) io_cancel(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 15:41:05 executing program 2: llistxattr(&(0x7f0000000000)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000180)=""/211, 0xd3) 15:41:05 executing program 1: shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 15:41:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) 15:41:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) 15:41:05 executing program 1: semget$private(0x0, 0xc098d025477684ef, 0x0) 15:41:05 executing program 2: syz_open_dev$evdev(&(0x7f00000001c0), 0xffffffffffffffff, 0x0) 15:41:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) 15:41:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000140)={0x0, 0x0}) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) 15:41:05 executing program 3: io_setup(0x1, &(0x7f0000000100)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000001880)=[&(0x7f0000001280)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0}]) 15:41:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 15:41:08 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, 0x0, 0x0) 15:41:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$netlink(r0, &(0x7f0000000180)=@kern={0x10, 0x0, 0x0, 0x4000000}, 0xc) 15:41:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000006c0)) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) fork() shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0xf000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(r1, &(0x7f0000ffd000/0x2000)=nil, 0x5000) 15:41:08 executing program 3: r0 = timerfd_create(0x7, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000080)={{0x77359400}, {r1}}, &(0x7f0000000100)) 15:41:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:08 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, 0x0, 0x0) 15:41:08 executing program 3: r0 = fork() rt_sigqueueinfo(r0, 0xb, &(0x7f0000000100)={0x0, 0x0, 0xfffffffc}) 15:41:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={0x0}}, 0x24000000) 15:41:08 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/uts\x00') 15:41:08 executing program 2: r0 = fork() rt_sigqueueinfo(r0, 0x35, &(0x7f0000000000)={0x0, 0x0, 0xfffffffc}) 15:41:08 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, 0x0, 0x0) 15:41:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 15:41:11 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='maps\x00') 15:41:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r0) 15:41:11 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') 15:41:11 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 15:41:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:11 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='net/packet\x00') 15:41:11 executing program 2: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x7000) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) 15:41:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @private1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) 15:41:11 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x1d, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 15:41:11 executing program 2: clock_gettime(0x5, &(0x7f0000000200)) 15:41:11 executing program 3: openat$loop_ctrl(0xffffff9c, &(0x7f00000015c0), 0x0, 0x0) openat$nvram(0xffffff9c, &(0x7f0000001e80), 0x0, 0x0) socketpair(0x11, 0x3, 0xfffffff9, &(0x7f0000000000)) 15:41:14 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 15:41:14 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) 15:41:14 executing program 1: r0 = socket(0x2, 0x3, 0x1) connect$netlink(r0, &(0x7f0000000000)=@unspec, 0xc) 15:41:14 executing program 3: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) 15:41:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@private2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1}, 0x0, @in=@dev}}, 0xe4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@private2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1}, 0x0, @in=@dev}}, 0xe4) 15:41:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), 0x4) 15:41:14 executing program 2: openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/timer_list\x00', 0x0, 0x0) 15:41:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000004d40)={0x28, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}]}, 0x28}], 0x1}, 0x0) 15:41:14 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') 15:41:14 executing program 1: openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x2500, 0x0) 15:41:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), r1) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xff9b, &(0x7f00000000c0)={&(0x7f0000000b40)=ANY=[@ANYRESOCT, @ANYRES16, @ANYBLOB="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", @ANYRES64, @ANYRESDEC, @ANYRESOCT, @ANYRESDEC], 0x24}}, 0x0) 15:41:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 15:41:17 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) 15:41:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0xffffffffffffffa7}}, 0x0) 15:41:17 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) 15:41:17 executing program 3: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0), 0xffffffffffffffff) 15:41:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:17 executing program 0: openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) 15:41:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)=[@rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}], 0x18}, 0x0) 15:41:17 executing program 2: r0 = msgget(0x2, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x4000) 15:41:17 executing program 3: readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/85, 0x55) 15:41:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x10) 15:41:17 executing program 1: setrlimit(0x0, &(0x7f0000000040)={0x979}) 15:41:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000002a00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000002440), 0x6e, &(0x7f0000002640)=[{&(0x7f00000024c0)=""/21, 0x15}, {0x0}], 0x2}}], 0x2, 0x0, &(0x7f0000002ac0)) 15:41:20 executing program 3: open$dir(&(0x7f0000000380)='./file0\x00', 0x40, 0x0) 15:41:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 15:41:20 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf) 15:41:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:20 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000008080), 0x240440, 0x0) 15:41:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000002a00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002640)=[{&(0x7f00000024c0)=""/21, 0x15}, {&(0x7f0000002500)=""/217, 0xd9}], 0x2}}], 0x2, 0x0, &(0x7f0000002ac0)) 15:41:20 executing program 2: clone(0x4100, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) prlimit64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x8) clone(0x80844240, &(0x7f0000000040), 0x0, 0x0, 0x0) 15:41:20 executing program 1: setrlimit(0x0, &(0x7f0000000140)={0x0, 0x15228314}) 15:41:20 executing program 1: mprotect(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 15:41:20 executing program 2: r0 = msgget(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, 0x0) 15:41:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) fchown(r0, 0x0, 0xffffffffffffffff) 15:41:21 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000a00)={&(0x7f0000000680)=@abs, 0x8, &(0x7f0000000800)=[{&(0x7f00000006c0)="6078a68fb888636fca57303bc90205e86422a7fd771bc00ecbe0a6546c5bde9197f073cfd30e8b41fc818f0ac45ad745c701ce6b0ab94a8d1d65e3d220de98086812128120e54ecfc21012684806622e567184224cff2a0f9e52ace636d9a9c59422c30e13805dd707bf93481d223437f37fd5bd9c39", 0x76}, {&(0x7f0000000740)="20eebcca6b82e102e5cd22e292d5e86e915a03e7ead9e1a22008cd", 0x1b}], 0x2, &(0x7f0000000940)=[@cred], 0x20}, 0x8) 15:41:23 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:41:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) listen(r0, 0x0) 15:41:23 executing program 1: setitimer(0x0, &(0x7f0000000100)={{0x9936}, {0x0, 0x3}}, &(0x7f0000000140)) 15:41:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:23 executing program 0: socket$inet(0x2, 0x3, 0x3) 15:41:23 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getdents(r0, 0x0, 0x0) 15:41:23 executing program 2: open$dir(&(0x7f0000000140)='./file0\x00', 0xfd273ea361250fb9, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 15:41:23 executing program 3: semctl$GETALL(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000000)=""/56) 15:41:23 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) getsockname$unix(r0, &(0x7f0000000100), &(0x7f0000001140)=0x1002) 15:41:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) flock(r0, 0x1) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0x0, 0x0, 0x3}) 15:41:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000040)) 15:41:23 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) 15:41:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:41:26 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x0) 15:41:26 executing program 0: open$dir(&(0x7f0000000180)='./file1\x00', 0xfd273ea361250fb9, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 15:41:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f00000000c0), 0x4) 15:41:26 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = dup(r0) readv(r1, &(0x7f0000000080)=[{0x0}], 0x1) 15:41:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:41:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) connect$unix(r2, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa) 15:41:26 executing program 0: r0 = msgget(0x2, 0x0) msgctl$IPC_SET(r0, 0x1, 0x0) 15:41:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000080)="ef367e540d8734163dff483ea983ae9e3b79e8a39523ee869b0c8bc7e7f9fdb646d4adae21ecf9b591174a7d1d4c46de1de4c07730d50f299b2b23a55de2c17ee715195743963d7865f5485411651fe40e9fd4c4eaa95866ff7b3939566060a938fd0278", 0x64}, {&(0x7f0000000100)="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", 0x79d}], 0x2}, 0x0) 15:41:26 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000040)) 15:41:26 executing program 0: shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) 15:41:27 executing program 1: mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 15:41:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:41:29 executing program 0: socket$netlink(0x10, 0x3, 0x15) 15:41:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x40049409, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 15:41:29 executing program 1: pselect6(0x40, &(0x7f0000000000)={0x7}, 0x0, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={[0x3]}, 0x8}) 15:41:29 executing program 3: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) 15:41:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:41:29 executing program 1: socket(0x2c, 0x3, 0x7) 15:41:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@key_params=[@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0xfb}]]}, 0x30}}, 0x0) 15:41:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hopopts_2292={{0x18}}], 0x18}, 0x0) 15:41:29 executing program 0: r0 = socket$inet(0x2, 0x3, 0x9) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000100)=0x1e) 15:41:30 executing program 2: mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 15:41:30 executing program 0: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x1c, r0, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_PS_STATE={0x8}]}, 0x1c}}, 0x0) 15:41:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:41:32 executing program 1: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$KDGKBTYPE(r0, 0x8934, 0x0) 15:41:32 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$clear(0x7, r0) 15:41:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) 15:41:32 executing program 0: fork() wait4(0x0, 0x0, 0x40000003, 0x0) 15:41:32 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xf, r0, &(0x7f00000014c0)=""/4096, 0x1000) 15:41:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8993, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 15:41:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 15:41:33 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000005c0)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000005c0)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffb, r2, 0x1) keyctl$read(0xf, r0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xc0000000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x81}, 0x0) sendmsg$NL80211_CMD_SET_NOACK_MAP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x54, r3, 0x4, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x656}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x99d7}, @NL80211_ATTR_NOACK_MAP={0x6}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0xe6d}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x6}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x9}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040040}, 0x81) 15:41:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x89a0, &(0x7f0000000800)={0x0, @can, @phonet, @generic={0x0, "0b8ef7d07838a5251d245dcee171"}}) 15:41:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x24, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@key_params=[@NL80211_ATTR_KEY_TYPE={0x8}]]}, 0x24}}, 0x0) 15:41:33 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8954, 0x0) 15:41:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x30, r2}) 15:41:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) getsockopt$inet_mreq(r0, 0x0, 0x3, 0x0, &(0x7f0000000040)) 15:41:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8924, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 15:41:33 executing program 1: r0 = add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000005c0)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000005c0)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 15:41:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xf0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000001400)="bb8f9f640903127a53527c6fbfe65d43b0e0586f2d40c7e7df58cac83420e83662d6e39bb6d5430622431454eedeeaee423d8f210bc3525fa7927c18d5fbc91ab13c2041136047d8da9375934d00f325499bfe7712208d387d41c31821c2a22d1325b556528e9b790b74053d1ed631c6ec8126d37c87216173138c00cef396868029af5b76bebac5e38b74d8bbc6ae66b6e202b6d505710377710ea7d43edf00e1a4c1c670bb4c263ce777da81abdd5ba5a5c82f67232f9b4d6f21b2e6afa8b38e4642b0daa2acbc0478d89b88e8b2094d4248855e5e81992e60be3afff0f3c3799350615489a901a659abdeca0c615a622ebf64175f990320e0356d4a11ed62eff72b709c23dd65942e8b534d7d775d370c1e435654a2634e6ee3649c4c3bcbe39e866f1eb9972af1a9cef42e701798a53dc92a242aadbac343e1765cf8ea5665e22deda69777e52b1e9e5d3edc022256939e1eee013448294911139d5b9c6241049fecdf9b31f4cdf6cff65d71b5071ef70e1798347c8846aa5b905e83050e3e606986ed3f603d18c5cdeb11cda1ce3abddea9376231af130e19fc7601ec1ab8cb5a7de9e2174547f18225b09a54fc8720dbb91eb69c1be88e601c3c9df4f2758f39a5151951b9c6dbb419ffd783a34c9fad10f201b8724d31865e2fc1fcf48db2be713053b43a0e3943c1e2b08e8a26e946c439d891db2a80b5ffa054bc8d0177d3214056250c61a537d2ec7630fb90395df2cd6aa9c5e573365db580520bdc3f1c6b2be992e1516a4b810a11935dc780699e461d9715f70c6d103ff49bf168f3cff4c0d0d6ba5671fcd2975450b0e1a3474139cb0f2d3476fcd87a8bccbeb2f5f8a821017b879aa5b9d1fafa9f4c429a74cd2da782114d97bf031746a817dd0293c4eddc3a9ecb5afe496f4971474ccd827449409f07cf94dda2e7dbe8520b5afff10a7e3b0b4289a167fc692635b5b7426d9e771b95860b09a3e752c867213c772e48ba30a78feecc7ff26e63e1749c62b52d377ac5cc52db830c965e04ccfcfb24ceacc69cfdc2094124dd27b2d68f699476a2562bab1de117ffc2b0702ee8b0b77f85fecec3a25b37ab7eb06232c9a73b4470f1727c82581d81942abf42d3ea37957927ad3dbd0ebe46678a9f4d25c47acaac83c14210a54b71fed40df017e2be27f01e3e6ea3ea381ca14efd202858e6535ad4f79a8cdf47e385b740a70c14e3651731a45cc0ca4a56f2e903cad0384efcc364caf67e09551d35c682ebc90a9286c4d274ba1b8ced742ede4e55a62db7ef9a96fde2add05b41599fd72a79ba280cc125cb266ef21b7eeafe3ee6aa78eef33fc66454549c3ec298cb683a55a32208cf6ce88b560166159d59e65f30540f62c5437652ea7f2a02f87ca242dd2250f58e75938a9a3ded51ae6598c2aba53287ff5cdaab17be7f4310f8e07e310d52778de79e1c2e4391b254be38910aa1cf6e1ca0e75d24be97d59f7025f16c6fbd549529b74e319c58f50438765ef0e3dc394eeb75dec41b3d80435b17520c97f5cd7ee692fb86d188fb0089fbf737dc1b96b9cc49be23a38a8cd92e5075f349993d7866369dd25eccbe1481477a05fee14e0edd1617921d7fcaa8fdc642e63b64388fa5b63442ff1466b1938d02546750b01ed9c980282ccbe10f204741249aed88c555ed6fdf7f68af9209807a71bbf4f31bef5a4223466da74ba8b034df529aef6ec6610a0d25973961e50e02af22d0ca8be1b9804a5918acbdb536e8f2f441ec9d640ed15133ee747440c86fc4526c9195954528673d25c8390170f3c19cb0b0c30b9e634c7ebae96946ae97c19eabca92226da925d22be37abbe0740938ea899ec42fd529a3b1063981e4c154219df5cf5af60a29b5a8ee530905725a14b28900eae937e705401ba8f632a7bca00d9724a992afdc9ed14aac71b8e3a7ee5ca095888feb195b4e083c3b611a1c2f8d092febe3b9f5f0df61e8d3c31a643c935b76bc1ad4265164e755484beb06610510bc51e8c6da8d71123bbe83a5e4128f41cf5c486d6a60496c300c406f990bee485cbdef794f2663ee66d2b18d8e55210c25c04b1a0c6d9c5f904e72806d2d4f5e5439bcdf146343cdffe4d0d70d42a9959cff9bd50c37cd478b0b0add16aae4dc839b46bca2ac7547144b6a422aed5e2db661bcb31a82bc0fc678e71a6cb090ef772860f3008b4152b5d281033be4a77b367baec3ab8ce7c83c601b11c8199bafcd15161a5454a6a982dbc3c2e3a5172b6a63e4904817075754eccbb0188c9cb2e5da9600f567485014887463b40f189b7ec3c5c0f36d502509e402c285765c78417ce6b3aab130ee79622dcd8ada842233e73a14554ee5e4995e32b3fe4075e247eb9bdeef64d1a7436c9b5782fb2f84f74e4c6e976289729c37b5bb8200a9480d181a6b11f5ec229b818134b8334967ae935ac1d81be4776fae4cb68b6fa330e93bd8de388b38455d569159bcd166df030a6dfedf28caf4608de7243f5df2c76f6680c301d819dc67d24d2f780432a931700a253b0a5b075195c6dbfd1fe17a1c11a3dffa872a07b877adc66d069fffb6d8326e1998c5a337c3d530250cae335ceffcf81dc438a47e73490d050a053813dbe6674e42c91ae94b4a88144f36adc1b08b4bcd6ddf4058c4e08d4dc83d5fbd843ee27eaf50b297c220350260d9abbeeb6deb921e50cae0ea590cfb6f00fb3c71520f565bb769705e2481ef27cf537d29f163c9fe3d39ed9fd18dc8b0c976cd302283e430807a9d751357f89092532d89fe280c69ad36e3541b5da9dea13fd19d0434c760fe295dfd9b9e63453c7853914c50b1b77ccd4b33c8b1f31fcb1aec040ffe2f9d728d8ea84297bac2e22230ebd1488c503b05b2e433cc37ce9fc123b7d3eb244b4549e9a841e73b664c8f6621ea5a4c9ff9c1da032255311f2c063a682baf4c97e7ba552bf71af4bd64f43872b846d15c65c487089be272cfa24a33f8c50930ea0bc4b089505fb8e97ded0e7e64a5ce897da6b940df4c3dddb8b4871d773f6ebf02058518c55c19aadb0f266caf18777ae68d2bfcfb2225961fcd10538ba664fd053a443320072707533ab761b9397bd0559126b84fe9196463ae50633017ea2d80940311d9c867102b1017f34af1965d8eb61be616a0d40656e2bbb750aee6f74f788c8acb2578e8686f5f8da6a19e979c152b7ee7c7f16902120588e2ff630144b5f929ffc593e946d9717c5968aa16c2d73d689fb5cce117acda3e23e5e0116de1cb6bddfa1a84cefb22c1e2c3753017696f27b9aec5d44f15411247643b84dd4410e784b4eb5b9c68fea671976f9b51c6526e2ddb40659611b0b3bcc7e249c77396fdb8c864ea9318f9de7fd3936fcbdc732c2f8b9556ec9afeb15d5e2df890351d66074d53dddc6e8dba8c91d733623ac95a49eb69c7de37ff2364ccddb01f6500750a012c2acf32a9f6bbd9e92d17ef858fbc34575db414ea42ad87a65b11ae5506469db256c421328f45aec73bdf18562447dc2840bbe9fc84dedd0fe6276fa174f21210d40193530ec7a70a9e60bfd6b00cba4d483be59950f16fa0dbd089b5fd0bb078badfcf42270cc62fe37be22b0d81f755263d74636fa466d2574ca62b58c649936d21e949de73ea45df3acade6609413f56fc218d6f11947bf1fd629d38d8acce90ee3c1a51117601ae126bec537e3e76ce7ecc53cfeefee8aaa104aa853a65aadf27bac9849ee0122793b11cd8e4f32fb07afa39e439cb738c30a6df958160aac15c26032a61aaf614b2e6601581fb0ab8d115e045005dee3df8ea42643cbcbb0b111130c42c94b7e874cfee50d5c2eb13b3a38c417fce9d740b7d43120431a7d44bc3934ee87b112401cbee3553837b6a0b4b3faaceb46eca4064301c8060870350e256ac9d5557f674536b9d9717a82fa211e7dfb52ca410d8a4f2f6b733c2a082f247538a6c40f56cf64204e62515db692f32733ff6f4b0787ef305d5e80881375467ae603ac3600e688c42f89a4fea4fdda09a8d59e19457c654a98c8129a8c65bae3310af2b170729e18400c915d0a2f4c4fc51747846630b95ec181228bda7ef48ad389815aa82de6c4a3b0746c28c01f9ec697ff17f095e1cf9d2fe78fdab9cbb1ca7aefc8af6a0cd98444735fad79e394a8f9c2fd358c3cde4ca6d57a620d0bb52dc6ff93f034b596f407c21511cc2c5ec8b0ede7f5c0acca61939ac7f2cad820c15133e69507eaa739e9a88936f4a74f0ad1574a1591f31f582a76157d89805cb3ba5e8d10509bf7a08e928653b4f05ba797a06765b74c8759fc34178624c08a2b99e59bcff5d33af2b0f9176b56c35f4da31c751a4c2fd88a1997cd9fc9bbf78220731d4c8cea23be1fd29c36b34d8458b7021ebcfafdc7e54096e517da3eb684298f742532d776164d9c9658e5faca0a3b08afca1bc27ed357884f49fe51bd0c38057f4288f1917e36e3865310b5eed140aef6150ae363293cf7467abd5e06cd7af5e2c49e7c5253a1155741e380bccb023a0faed93d9a64512d72436f1ef4ac0904a413e45164c23413bd57274a0a951c41a9a43aed094d4ea5c480ce64663cc9d36723179e2b19a48e9277a6591bbd888a06e0f2f142cd4495be4ba7274d69ba32a2788b935b2f18c5f336cb9de062829e2e0bb476efb36c3f53a766c14314f31637a464ac59d378ad7f51bef8d88715613653a427038e0d3e4dc3948bb1d70eb55c91c92f7510b1c0387253b458d2c90d17238f9eb239c680179a6c1e0759be367963e3b4d7395fd3911626582a094e6a8d0e746242f94267a4c57d5b2360ce3a6f7f3e3c10e124a54ed24d1585bc7b731cf731c94ee00ebf070b999b9bf28d76bfec9dcf12fcce2b9c4444c706ec6b943b5f39e9151a764ba1cd0cd6c1c7cdc3aa824cf17da705be27a18fbee41be39d6ae4dd4312f5f4bfee2c5bb21d941666f9d79b0f80c9b1bace84a05d2b0e3be1c3fd04d72b4b0124595c435813969d413960fddc858730a433383f3bc0472cb7683ea569e001f00"/3584, 0xe00) sendfile(r0, r1, 0x0, 0x11f08) 15:41:33 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 15:41:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89b0, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 15:41:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@dev, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d6, 0x3c}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000300)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0}, 0x0) 15:41:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8901, &(0x7f0000000800)={0x0, @can, @phonet, @generic={0x0, "0b8ef7d07838a5251d245dcee171"}}) 15:41:33 executing program 2: mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4032, 0xffffffffffffffff, 0x10000000) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 15:41:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8f}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000007240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x80) sched_setattr(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x6066f8b037950f23) ftruncate(r4, 0x800) lsetxattr$system_posix_acl(0x0, &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) sendmsg$netlink(r2, 0x0, 0x1000) lseek(r4, 0x8, 0x0) r5 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8400fffffffa) creat(&(0x7f00000001c0)='./bus\x00', 0x0) 15:41:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:33 executing program 1: r0 = getpid() ptrace(0x8, r0) 15:41:33 executing program 3: mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x22070, 0xffffffffffffffff, 0x0) 15:41:33 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) fork() munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 15:41:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xf0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000001400)="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"/3584, 0xe00) sendfile(r0, r1, 0x0, 0x11f08) 15:41:33 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000140), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 15:41:33 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000005c0)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffffe) keyctl$read(0x15, r0, 0x0, 0x0) keyctl$read(0xb, r0, 0x0, 0x0) 15:41:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty}}) 15:41:33 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8980, 0x0) 15:41:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb1, 0x1}, {{@in=@empty, 0x0, 0x6c}, 0x2, @in=@private, 0x0, 0x4}}, 0xe8) 15:41:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8947, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 15:41:34 executing program 4: clock_getres(0xaa94cf02b11b312b, 0x0) 15:41:34 executing program 1: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 15:41:34 executing program 0: r0 = socket$inet(0x2, 0x3, 0x9) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@private0, @in=@empty}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xfffffffffffffe8c) 15:41:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000000c0)={'sit0\x00', 0x0}) 15:41:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 15:41:34 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) 15:41:34 executing program 0: request_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) 15:41:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x4, 0x2}, @val={0xc}}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}]}, 0x30}}, 0x0) 15:41:34 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000005c0)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffffe) keyctl$read(0x15, r0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffff9, 0x0) 15:41:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x85, r1, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x0, 0x28}}}}, [@NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="44301fd6e3c9507ff228a43ba9db35b0"}]}, @NL80211_ATTR_REKEY_DATA={0xb0, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e763e576863b2e81"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b2940e13bcbdf1338ea7b7152effa95c"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="38259ab41f99abb42a86b1d6d25cb18a8a75ea1d410fc0eceb288fc53a947d64"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="e6d8a5e5065ac63e0207e03e73eaecd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="b9ea06d7fb2250c137bb8bc44bd285b4094a04709f2ac503"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="cc78c6b1d630c5b4842fb72fb7f038494b4cb6c6c1c195ef"}, @NL80211_REKEY_DATA_KEK={0x0, 0x1, @kek="89a8252b9bef9d7db5ffbd3f20ff220b"}]}, @NL80211_ATTR_REKEY_DATA={0x34, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "f1f66ab4a8ad29e4"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="860429b8a0860abcaff8c16baa90129185d330242593c8c6d6722954f654a4ed"}]}]}, 0x11c}}, 0x0) 15:41:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0xb}, @val={0xc}}}}, 0x28}}, 0x0) 15:41:34 executing program 1: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000300)={@multicast2, @private=0xa010101}, 0x10) 15:41:34 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, 0x0) 15:41:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89b1, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) [ 2347.875036][T29514] netlink: 77 bytes leftover after parsing attributes in process `syz-executor.3'. 15:41:34 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x88013, r0, 0x8000000) [ 2347.931234][T29526] netlink: 77 bytes leftover after parsing attributes in process `syz-executor.3'. 15:41:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x40049409, 0x0) 15:41:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 15:41:34 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r1, 0x0) 15:41:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb1, 0x1}, {{@in=@empty, 0x0, 0x6c}, 0x0, @in=@private, 0x0, 0x4}}, 0xe8) 15:41:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002300)=[{&(0x7f0000001100)="6942aaba3125171435d7f7759ee6631fa7501db9ed84d14baf0e5b5c72bcbab561fef07d41836945cf2e7948f34839f597b84c4aee052fc2f5e12a3a1a62fafd3a75417ead7be6ca286887f4513070", 0x4f}, {&(0x7f0000001180)="6daa0cdd9d37854c915fca34c8b75d168742e245f8826e4a6a26c12d99c351b7697768a93ab9c7ca8c287891cf9fd42b4f18c4d6586f0e88a35fd937445ac280266acbedb01cc29e215fc29d71a7a85e03ab35acd07afe308524e387cca7d73c5e8dba8c18ae2d0c22c5782db5bbcb1c915fb7ba48c1c498813e087a2dc592c950e7d72543f756e0a2a50b681d987ee15fea76a24d25df62626f4c73189b2d15a2beb7ab3a676457804a91852aa754b95de6cad16823833474e5cf7bb3eb3acbedf4a9c5e7d04548d9d7f78730896adc5f9fc3487053", 0xd6}, {&(0x7f0000001280)="bd98b79c0b1fa4911b4132615e04c1ff349cb09106800f776f27d36943abce82e4cd042da287b8ac946af7168b1b3db6931ae82ac4724a14c9d0cc9f8b7770a20796078ea4356e6aa5f5fbca5597aba2249a3a0fdd9de72a644b6e97a8cee92b876edb0ae0ff7027049845323d0df217103a5e713f612942cf96a2a93c14efcd6825810f01aaa9e868decae3f683ad292883fb35addff32036ad2df12532e7ed7e3870c3fa93ece1dff6aeed28ea7a2c856e663b95a48e72f77487f418dd04a4acf9647738b4bfd6a05fd4beb8d56541c92edb66fb48384be943eec1660ee7cfd0286aecd238f82c64c5f1766c94f7855d4168949aaaa39199a86cd614bf9f5ca666bfb3ce62c6f937b8fa2ba7a422d444869d8a9af5a803d339866c9d80ffe103d61bff422396196b42c4909994b7993c5ac85496e43273ddba810b4c6212b2557a7d08d1149003024da1184f99d2cc14c450bdf0a225ecac285f41998411f4966cd330a696ea3218697b318d8af92345ea69d9445640eed5807e0f5ba694e66840aa80f215cfd34eac33d92f89a64e989dee396d1831eccaaed64d5141edd4ea561dbf8665486a88e0e7e7b8efbe0f661008109825e205a5b64e1dfcb18eda06bdb3c0fe16caf93ee525a4b7b6ff6466496a0c2097b76b0c4d304fbce95a8a2550fa833e37a6c606765c9def7231ad48fede25b7efca58e41e0eb23a0515358dd76e2d2764fa8a69bfeb642df46144670e845732afc2b06fda061f0b09069221b79e39b7af9766ba7e73eed1f40149738901c254fb817de43caae813ce089c69b80eb38e62d2261ca3a25251953ceaaadcaa0672ae742fc64bbdf5fbec618f64cc605cdd9434402edf8abd455a84459146fed9b0b60d595aecd3bfdc5b0cdef04a170c61fc02d559cc970a2a985c2801516a6ef33c2a98a41b4cbe519f2bade5a02c926edc83d7e2c6782ce4fde3116e2565fa5d6e8fadb6f77890b6a21b467e411ae90f084de79deae88c2beec89e14652ff32227589a8fe08f62b8a6846889e8596cb6ca7f1f49d63026d26a12830d2186a8633158dd73346782cfd65fafe5b8c1d8b8a4d0a94e920c369db5319ba4f31304d1b5d6f2fff0b3034232990e3ecc86bd0bf28662104498bef5704bd0c0fd1d9a81f0fb81aaa840d9fcb9c4d172dd76d4fb4c28e542d5b3177c0b5365ded14da95d32f46bce8879b611f0f1e2516990796939a7ace8c17664991ec1a5160257fb5186970779b44c283e443c871cac4640fd47d0799c1f7d6c5394f44938b89eadf0936fe090dbd8e46c3d4bb2a37e5a3b8383402de646349b58246c4072365e1c3594c82fff410711b1f6f17a7e41560c9147a1a8163228051aafc56030e81a5e3f50f722671cf94333c0d531dfbfe52208f2fba747c3babeeb5ff51c067722c785e8b64acd20248167bf3efdd92be10c0eac9be1be5b1b20718ee6c5c0eec859fe9ba9765f9db009e72c8f385958b4111a9caf15d724946aba41960058a9d8a654c25d92b0409355a84ffb7021ba805cd228b601f707452f4c2d660ccf50032ec3c5a40d045087ed1c9240e13d4cff740d58bc5d2abaeda7ab733559f1d6c0c2292be91686eee0826ea0b0e35cb53b0faae8ec5285eda21d1c3f8eaf111e6e9b3c7ec4b4b54607903a5c315e02476c2d10c3b98c83322d2979a928f68e4d85cde9f7b20678a43c3088b9b4d10cd2923cb169d4f70e8aff4d6b353c82c07c1b06c29fa0fb94e9f10561278db6ab47f47b5b422551eeff2624dc90e9d682492ed85e338b9fc393820c5e160ddabc320a90a308bf9911454d097f4bd1ac233f253e7b9e5952d837ecd1c28dd46507dad7d8624b824761472adcf7afcaa49d894bd73873363ff566864d113eaa20e9b1158e70d4e2a769e06765bfbad20992a763e38d2a052a355f891506abdd4cc49129bcd2946ef3a0108724a34e2ee5d45051d12ae44abc4edebe2fd9458273257793ccb4af8efa5a1fadd5f3b97070e07a4fbdffa56997fbc5c79fd6e111008d87f269e764640789695e849c8ec20f304ff0ca5f042e8815fde93f1a6a8b7a601fc6ee0691a39ac7ef09d54e495fcad364cde3c249714eac5bb23d92a8bd592f07bd194e92183d1a125645995671c66f4af5e50fcb22b52cc6e3936228428c55dd85b15b9e6071e5f72fda30ca577f111b4f40246c37bfdb1957feff71c54fee794bb6851c476f84003d078187ee054d223917285a6dea645b8b5d9ccde0a96383ab54c9331b7e02b02572ac065ab0970b799a77271fb0c78e62cf24fdb8ac3473b3728f290bc486517ffba3ec719d3a8deb27577c0bcd90511a6f513286873d89616b6dd9f922e0e24878716f45da1cfd1de78e12423e3bee745525ee2a912b61d721e5b6a7619f41f513cc3cede15190b5b62e8c72685711567b17dc6fff5c2fc4fe221c62594202a494b34fc37c5021e1ef19f0a82a88a8717776fe2dbc7f0f7378ccae9bf63c4f78cf7c2057ce779da2f9981246ce8422a291a1cab4730edb7805a8c857a6e759f05c3c8a1ed0dadbaa6fa90ea5d8152228b894e59b6351a35700aaf9644649da66c3333bf486cc0a800d552617db5976069e2e0f3d994c419e945a4eab5ce98b7f68ed85a463f3925b098754d2de1185bc8389b9e117e3a29c1ca337c030f51597e11af6aadceb59b12e10e97be4fb722241887851797712664d73dac46c15bb2d111e1bd6241189609adfa318ef88672f5ab61c8f2f8c328c8dbc71b9ac1ea2533310f7f7bc398f44644bebe1dcc02956fbbfa988b2727a4c884b9d801279de36fac946c24450ad00eee26dd8b03701327dda35c3e8f3e3ed969fa7ea0349367e6431e76f0d37cfcd721d364696bc03ee4eb08d21e4556a078a5efc1acf37e2a73f1f63dae4c3ffa5d70ad6506ca3d0990ac7c8057ef0a0c9b0004da86dc71ff77601f3af6fc71f87194a1b4810a1fc18f86bf095238d8923cea06e6432eeafbb9ff49fd5ade44126ad607c04d723cc1ee2902f12fa407844b7a8e7c6b8d6415fed4ee039f23232e3c189daf69c494d139752e04698553710374b575800e43979a4c9767d9f9bb02a8fa7e1c428c7a118cadfffc53aa7bcdd2acdfa221b9faedadc6111cc273a05cd03b5db21813a80717831c9a42b2fec01d48d57b0672d3f24fae83147c33f5da2a405576b1163934d872c50ce00cdb2196dc7db8fb9928079a4ed200fe0e610cb7ca8e2e525f1bd8ba3535b799b6e0ef0b329c597e5d8b217bb8b9d6e72750b203616d06571e08e5dbf1b8f63361487fdc8f46c30936f48654c5a8a4455a0d190e3a0a877311639976e752fb02f7f3b9754c8e612845f1acb9419c3bf0cc13082bbe1e63ce85591405c6aa913e4885c47ce76b723ec3113295b6daf00ecd5ebe7edc54ec0dcdafef9f4d2ea438a968a338dbaed214076af1047d3466712a2d645665e6333b176ead7a8b30710cae03a4584dd533dadb3470906508463b9cd03c5647fa0d933a05c3163964229afcad621703b760b1796d2628c6edba58f85e11b12bd093bacd95081ad723aabbed6a6ab157ecac381cc91a56ca30374df892e4cf811e0ca1821c2da30c07d4f9b12729e88ed628f04c844f19c9b4b18b22ab3733c9f0aa2580e2eadd664144fe1edc1946cd496e3de5016882705ded3b3e31475df36cd1c6794a1c540821d7338398d68308a8babc067959ec855e53ce7ff4daeb58a0e7dcf884e697b223aa71576c9bae1b8fbb673cafcd060c0448dd6e32e3451a5c624c7bdcb1ef023722ef08d9e9be73a6dbb87fbd275fbe8825a0baa1ea37da903fdc33c8ea87b386869f59bc6a5e5d4c2952161318acc4889b4f40c07e7a501e22b617ad2299936627ea43111ba6e4c4658af7500497f43cf355ce2ad98aa4b31125564aa69b46db474fbc69618676a160920e553f44a24f0d9466f003553f742f28b22e45b856c683e1c9b665919f333fc6ac7fb9e3b428ca48aa0e07654630ee4c98439bd23653f76489f2b8700944f72d09833289508abd88f3e906699c33fa746719e9eb578d3dea065fd823dbbc686afe70e45b36091fd59490409101270b09c7ef239f124cf80abf5ef00d77a22f455819f09f41991ad1d2097ffd0b11d6d970128bcebef247ba15ee0f728bdd55a930f2218787a68c8cec21e813c8fb19ed2c09241ea2a98b2da4742726b63bb875ddd0823c13ef7742b251e8287cc10aaebb2a28ef5755b6d3c5153d65d5d24ce5d74a32e9749364f538f18fe80bc0c2233ae6ef51c6a8759cbe6153b53986d72880474f23cfbd5c717d10cfc77ca9ec87f0bbdfba85134baba81b58513a635f0a6d32bebab09d0220b1f61cbd8b9cc679cc6f85e357e6b3c6f61c250b1ca6f257a9ce7c62bfe0acffc29bb3e450acffc4b2019e09bcfb36aae35e9a6e46387c073d7170b41b8edb267cfb2f5941e86dfa872c23e0530af2d10cce88df673a17478e16f8fd43c3c81aa5e682c9fe21d7a03832e766e0969729bdeb403d46794fcbeae8a50c1cac2d75fb6d4c02df6da3cee35d5629a96eea0015b2a4e0cc73b7206675e5b97cf677fb127f5f7fc7ae08b10ab478346fce60debf4dfff3a82828475e782034f390232516b85a47b2482eb8b28929352097727dcf12b0039ee78931e06236add9fc49304e98992e4569530af17adef2aa465cb63dd77f1d03a60bf29b1968943320529c6c1695b86f5d2966a79fdc5210d8775531cdacf171f127cdd9d1078a104b3c71e1df96d9ce3dcc58a25059b34e0730596924222a85b14f0e19e1563048ba8fadaae6b3d9d275612e358339c78a9f7094ece28cbe9c81af0a6a311fd8092d53acef0433cf105576bf9b29e93f414b38520d6e669c0ef54ed1336acc47e1ae1f9b12b444ec6130fdb6e5c4c3fc895a8633d5c38117cf37c8a24fd7b88c32b9348ea06653b617c78d8f0f9a0507f664f1275a127cd721f6e350cafb53c9dd7aa032e82f4b0b158f01a869ea46ef273b4a4903162ae62517f16fbae400b0ebad145eafa736790ea8d4a54b1470d9576519eda465cf5f6a0def30eb73b6f2e221990f0815ffebde1e44b72cc408bff9ea0427a1a97c7b8abc32f0a0da7940e575cda046c1b5a8c2342462a4c922de2295e7fad33584c05095565cafe17419709a78ad7a28eb9ec462394fb9f9abeb53946627b8f337ee3d217fde60f43dea549cc0229af990185b62fb7b79e02467beccf449b9041f506612bd207e079c992fee4b0aedb142c7490eba00d2c17479432848f2f9bd129b24ed483b385688df7b6480f32f052cc3002d225fde63c81b97259a414d2935cae03f1f1b96088748dbce7fa71decdc7af8f9a71b93b252345", 0xedc}], 0x3}, 0x0) 15:41:34 executing program 0: setrlimit(0x2, &(0x7f0000000240)={0xffffffffffffffff}) 15:41:34 executing program 2: r0 = socket(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 15:41:34 executing program 3: r0 = socket(0x2, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 15:41:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@dev, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x3c}, 0x0, @in6=@dev}}, 0xe8) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000300)={0xa, 0x4e20, 0x0, @private0, 0x7}, 0x1c, 0x0}, 0x0) 15:41:34 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000380)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) 15:41:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 15:41:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:34 executing program 1: r0 = socket(0x2, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 15:41:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@cred], 0x68}, 0x100) 15:41:34 executing program 4: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='cubic\x00', 0x4) 15:41:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000280)=""/112, 0x70}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000080)=[{0xffffffffffffff9c}, {}, {r0}], 0x3, 0x8000000000049) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0054f) poll(&(0x7f0000000080)=[{0xffffffffffffff9c}, {}, {}, {}], 0x4, 0x8000000000049) shutdown(r2, 0x0) 15:41:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) getsockopt$inet_tcp_buf(r1, 0x6, 0x23, &(0x7f0000000100)=""/226, &(0x7f0000000000)=0xe2) 15:41:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002300)=[{&(0x7f0000000100)="e2138e4cf85219ef7500d72a7ceaf2b4fe44363cec006d8c06ab9f468e618798c687c5b6319181e95e7b44b5d495f83943a5375e8631d2b8c0f729e962cb0374e34fcbb9645a12be81a8a04b306e366378437f9b33aa1b10ed4aa1f198bd3608edcaef9a79ccf92ef5b9c6354b21182c9e23c074b06a788622fccefa3461bc05a508d66f57f235c5bc18c4895b65b9ac1c392577d11bd26982cde00769d786f4b9ac0a6625b1e9b6a794ff77f5339a94919229ffc680b7acf1515a5ed47e30a5185aa5cee66747cec4f90b387dd64ed76c72d350e78c29c1d6cd968c1895c353261007a08bc60a9a9c50b6f5c8fe77ee834b3d996e0486d315a8b038c8cf5851d95a6d6ded9142a256749a5530100099c87485125de2ff38c005e2ed3fee3f62c3f70a7fe03e0de46d811330fef3d9fe2ac969fb7697f02689e86d0c2b70c042246e8501093491cf1e2b59c411e3b32fa501e44e391010bc993884f272f50faf5ce610e4ea6d36998f2a6395384f894c1e9f9bea6103ce79ef6841ea19e53eddcf5ae6941d752aa201dae3389cd5684ddcbf9b0995dbfd5afe0a2fe96c55185ce01f0288749f7aeb6a101ab634dd9f7c8a2d12c36450000b9cd7032fc120e29e5ea258b1e5c08bc1e7e40a30a1d18da1f8501587e8c0f7e8ead516eea92c73487ab08fa4b154c4a16bc8e342d94e55556f296cda0aed5075681732e654de5e53099ff8c60934abfa43fcdf439c501bb07d8df4f607f58da2b6dec3750cd3cbbaa1a34bd5dae73b29909970637d9c155a13213e11a7a234221ee8bde47caf87980fa36c0c24062d49f0ad3d51877ad80c457198dc9805544b8aba16f05360bf9643334edda0520085bc706301dd64a90ef49223fde457f93d452f71f1f7c0e74fd3e356cd7ce2ed2df4331e1580111f828307b96dc5ef2eeb992bc34603a04a4c9ca8790064a8997e029e566057a2b9919f60ba36338fb067360c01b3746be58d477ac88c905d7ef6c4620d4e51da4d80c21f17091c5e47aebeb6de3e925dd632aacec06c7a1d85b301af5f715463d98f81a02761bf83be476e4bcf4d195f430e017a8f918cf3a3f80a678f281aee73efe5339fbe47c1e19d4c9d5ab3c1cdf6330b235bdb5d4ec4529cc216414c5bab382d75f4326103a911f7272689f840f03b6b1ac1cad8b23cd072d5de85e2f39e0be34c3dda10aada42f1a0e50521e0ccb267b2df866ddba8aac02510470153fa880bc845acc0a08bc08b9f5ea2f01dc66d05ff12033bf13c67be595f6fe5d1bf11183cdfcc646c08761562404a86415343f00808c3a257bf4d16f2efd52ab7d0ef4d81f6b211746433b78791c95567521577b045a4a469293f929aa23a02fdb7042ce26429905ed66d5f054d26348fb81ddba8b3357f46004988a1ee7a13faaab3f245d85548777784be3098cbc76cc0b9ae83299b00396f28578902042ab9dcce3b143df4e28cfe40d00e975149fc8dd1923ee4847fd382c98256cefb854f6eee8420aa439c5436ae28b3b0c06ebfa326e8bd19a68725a414d9db69ffd84d956065d7f5ccb72828a4e8a5bb32644147a8abdb13470fbca51d3ed0e382563c90493f5ba8e67cfb7d5f88849b1d1bcc0e9c2c569d1f93fbca1b5afc02dc3f0577d98e4411baa670145a507c3ddb1e6c69ceb5854804d292b5f82353b4c8c45e4d99b589e4a1c9f6a249072de34335e94e13229c5e970511fa21a41a886e2dff7546a89aad29fc9ea66f6e038c9afaea4c8be882afe00c7d8ccba17d1bcd3853113b2494167925ae3299744ce8f21b5d46475b6b463cfee1f67a221591f06d80fd601a69ba5c2bb0a0a635593d766f1046234803a0cd516082c3a3dd5de82c967d4ff0aa4701e3c781407f609460595c8218bd448d24602108375e87250523474f25c6101ed829456d135fa928835f1c5b97daf46982c05b21320c77cdd521d7312ddb4a9a5b08f05af1bb9984a54f4d709b6d9b370634404e1a219fc6e778c6043c112089fe233c0dc1438185fa1d2f41e2f4500ee96ce240862f2e0220cfbd774d1bf26059afadd5a7990959d5a89010b54b9410527c71a1636e1874e497307259dc68481f3890d285c002bd788cf46c7b45bb9ee91b380565c8ce72716bb9fc65c7c74e144d15f3a22ee2c7a10e8c9702442c58b8d0e4fb498c642112aaeb4d94c8521e57b16314ae01b3dee757bf9675105f0e5ec555f03241d8933f7427147206ad2d302c28cee2c8f0049178e4b358f8a4dfc747e3100ae26ddba75b0410745e959ad59cd8a6c768f652ec71e401fda9f0ab1f11996ec49d61ad523c3bea97ab18e94b0ebf9cf241a4c916d2aea9c46bc0cf192f8bb9dc4889940af5bd3cf5bc17ded35b6bef76cdd25f34a71cecedf92ac61024c851e79cac805e48b290a6bae91cc6129487292bea616661166522282f396f1554ca14787d8baf1239da5011f47b8d4dfad02ae70a3590b1a6cc9eb07987db1b02ac2d81c3defc7e04cefbbf567544592f9255e105aa90ded588b1ea10cc21a6030e16f5e2aa8c005c254d8b28ce21ae732e03766fa757fcf8fe6f3026ea2369ab85b8c88a210ce6cd063e10be880afc6cc45f35cd728e2ac1b2fdf5b58e3aaeb9f4705fe4be3ce5891fd8ed0e1e05757a7d8457ca60f605a24b6bdfa4d299b79252c8ddfae6c06c6e441b67634cd7d0b240a31ddad81d63825f339b4ce63aac91823fcf9e8df5ad50fd996fb3c1b2e0b1cb383cdceaee6677d6f93a493c3ff563a34efdf3d7837cf741b3fd1703f05691dcb090c530df7ba44a6a9b236bdc2133c794a1f9c0823d9343406dc38a425f6f4686adfd22dbfc83d547eb48fab0ce9b15f1c9adf1ae56b6e2debf3978ab1828c4efae07befb2cbfe6c24ccd40e2279ab6c184e3257a4d5522a3a44a697bcf7caba7204eb7531c111170e19c7b4a9250d69d1beb543f876e52dad7784622b43c3046bb8503ae0053484cf9aea7a44201d18d2da73edd4826267ac444cadb4fa15b23522785cdc87d8b630546c6eee970c309e878dc0ae1523613befefc83fccb41537bbce13e8003e4547a75c1122dc0e4817bb11a4c4578f565e0c97d12637a734b30d32f05d961a9f53e4e7a0995f0bbaea6178445f276eb358fd51fd8179b2b0c4450df48677df4eaa3a937148ac4567a123e186c1a653bf582846f7a9bbd2509396a0f9330e657af003cdcb9cd194b8e0f420718993878915fca1b551bbd12e2c429e299ca43a3dc08864a9d736910619c2f6606aebc65a1ac68945277afc3e2ace54a8791b3784bd2deba7fd099902424abfdca8cf76223655c29c945637abda7517c05e5540c02545f546124606ab2099a8281b2ce4f08a26ff301d4d557b392d8381cb2d0d7118b916671df5eb85005fcb4862aedca178cd367756217733a7890d0d802e0c2673aa821662e818409de9dc8c80b8641f412037fbd7ff1201a4eed3f440df775eb1a6e032bcb58ead32fef10158ff93997045c54f08312751379060e89e73de2cbda616ed66b6a6308062b114cb7ac995c4df08007c7ca677455ea5c7bef7999d64268bf1b0c1efdf5a7c65fbde32d80c662c2eebd6a9952886bfa306e8f6f32b2db9b0a10b9bf0c0fd59bac5e910cf6a0f40b76a02e501aa126cc0ee1aaf92701c41845b5863f4464db6d67871ad4f3e50e5d201aef17203e214786fa4d623f4d6b5f0cf7655a55436b99ffd2bbc832cc3ccd0a6d8ae84f18bac796ae4199909bd5e2511b9b8b96db97b8528672d4747b5cf50c35ed8b05d89ebd4fd1973c5eabb3081efac538b48f26cccf574755ba9ae080cad5a25fc7408fe14bc81b54d23ba2baa8c2bf507f4dc28dcb886b34723a2fe54a53cd267b3cfbb4bdd8921b5d3eddcb4b3d60471b5d8c5510efdc1d50a0cad6e56ba2acbedec4e869914f9b0013d10f02aec8ac4be3257037a1f3e5df79a0c07b229580692dc9d7cb391e8c23bf15ddcb84ae2647f8a0ef3f22e57ba5c188fa7422abe5cb5060b5e314dc85f69a4a2b20016585ca2de03e392947e5eeaa853393e073ab487dceeb00976e7184f422ea17ee333ba63080295f1f33c5f39e1886b528b5773d196c4d33ca165fa43b52876a7ed69a4aec4821cd456ba63a3d046a35c8ca5e6d43c1e13fe339eb1f47591674dccf7eaf2a849c87dcc8f95fc308dcd1645e3ff65ce0a2d2b4ac54580ff935e2ef360c12d0da1262fd976b5c75aa96bb7c9717041125fba97e594245fdcb965629b185778039af3be7c65c32ea124440ad55d48294ed5c2e13cf9e858a49eb3c13ec26b69c7c8db07518918f131651cc819fe8c69ad165b4449968d1fa", 0xc00}, {&(0x7f0000001100)="6942aaba3125171435d7f7759ee6631fa7501db9ed84d14baf0e5b5c72bcbab561fef07d41836945cf2e7948f34839f597b84c4aee052fc2f5e12a3a1a62fafd3a75417ead7be6ca286887f4513070", 0x4f}, {&(0x7f0000001180)="6daa0cdd9d37854c915fca34c8b75d168742e245f8826e4a6a26c12d99c351b7697768a93ab9c7ca8c287891cf9fd42b4f18c4d6586f0e88a35fd937445ac280266acbedb01cc29e215fc29d71a7a85e03ab35acd07afe308524e387cca7d73c5e8dba8c18ae2d0c22c5782db5bbcb1c915fb7ba48c1c498813e087a2dc592c950e7d72543f756e0a2a50b681d987ee15fea76a24d25df62626f4c73189b2d15a2beb7ab3a676457804a91852aa754b95de6cad16823833474e5cf7bb3eb3acbedf4a9c5e7d04548d9d7f78730896adc5f9fc3487053", 0xd6}, {&(0x7f0000001280)="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", 0x2dc}], 0x4}, 0x0) 15:41:34 executing program 2: socketpair(0x1c, 0x1, 0x0, 0x0) 15:41:34 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 15:41:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0x40, &(0x7f0000000080)='vegas\x00', 0x6) 15:41:34 executing program 1: madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6) 15:41:35 executing program 2: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), &(0x7f0000000040)=0xfffffffffffffedd) 15:41:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000280)=""/112, 0x70}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000080)=[{0xffffffffffffff9c}, {}, {}, {}, {r0}], 0x5, 0x8000000000049) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0054f) poll(&(0x7f0000000080)=[{}], 0x1, 0x8000000000049) shutdown(r2, 0x0) 15:41:35 executing program 3: connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0x2}, 0xffe1) 15:41:35 executing program 1: r0 = socket(0x2, 0x1, 0x84) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 15:41:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200, 0x0, 0x0) 15:41:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 15:41:35 executing program 3: r0 = socket(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000040)="a2", 0x1, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 15:41:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000000040)={@multicast2, @loopback}, 0xff5a) 15:41:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000000c0)='vegas\x00', 0x6) 15:41:35 executing program 2: r0 = socket(0x2, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c}, 0x1c) 15:41:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) 15:41:35 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000000c0)='cdg\x00', 0x4) 15:41:36 executing program 4: socketpair(0x1, 0x3, 0x91, 0x0) 15:41:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) 15:41:36 executing program 3: r0 = socket(0x2, 0x1, 0x84) sendto(r0, &(0x7f0000000000)="ad", 0x1, 0x0, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 15:41:36 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000100)='vegas\x00', 0x6) 15:41:36 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000000780)={&(0x7f0000000180)=@un=@file={0xa}, 0xa, 0x0}, 0x0) 15:41:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:36 executing program 0: r0 = socket(0x2, 0x5, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 15:41:36 executing program 1: madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2) 15:41:36 executing program 2: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x1010, 0xffffffffffffffff, 0x8) 15:41:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f00000007c0)={0x10, 0x2}, 0x6a) 15:41:36 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}}) 15:41:36 executing program 3: madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8) 15:41:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x42, &(0x7f0000000000), 0x4) 15:41:36 executing program 2: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x7) 15:41:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000800)="ab487a18a6ed2a5cbab4775629f49b929c14f905357a3bd216f70ed9a11acd994128d0b129837bc04e4654726479fc0f908ecd7abab2379f40aebf6300a2c1726b733f562c7f734d01c0e69d873e741ac65e4d028b4bc74ecda9eabe85f0add871e036396af069212648955d1217fb0af7db053a573310be60715e69e1ad39f476ccd885a176f373cec736a295d205bfbe6d43d7ef4ccf5ca79e18c3d87ed5695572437f109984e49fa78519d8bf6195b9c5633f780145e1682b231da1a07b767a5172a56e351ae14ced99b84163fedf72e550a5ce7c87561d3c32c410821f2edc", 0xe1) 15:41:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='vegas\x00', 0x6) 15:41:36 executing program 4: msgget(0x2, 0x340) 15:41:36 executing program 2: r0 = socket(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x66fa4e1fbef62254, &(0x7f0000000280)=@in={0x10, 0x2}, 0x10) 15:41:36 executing program 1: setgroups(0x5, &(0x7f0000000000)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0]) 15:41:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000800)="ab", 0x1) 15:41:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000280)=""/112, 0x70}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000080)=[{0xffffffffffffff9c}, {}, {}, {r0}], 0x4, 0x8000000000049) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0054f) poll(&(0x7f0000000080)=[{0xffffffffffffff9c}, {}, {}, {}], 0x4, 0x8000000000049) shutdown(r2, 0x0) 15:41:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/145, 0x91}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000001700)=""/102400, 0x19000, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000880)=""/233, 0xe9}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e00746) shutdown(r3, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000280)=""/218, 0xda}], 0x9}, 0x0) shutdown(r4, 0x0) 15:41:36 executing program 1: r0 = socket(0x2, 0x1, 0x84) getsockname$inet6(r0, 0x0, &(0x7f00000002c0)) 15:41:36 executing program 3: nanosleep(&(0x7f0000000000)={0x0, 0xf7}, 0x0) 15:41:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20104) 15:41:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000001280)={0x10, 0x2}, 0x55) 15:41:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 15:41:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 15:41:36 executing program 3: utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={{0x0, 0xfffffffffffffffe}}, 0x0) 15:41:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) 15:41:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000080), 0x4) 15:41:37 executing program 3: linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x2000) 15:41:37 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000100)='dctcp\x00', 0x6) 15:41:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/145, 0x91}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000001700)=""/102400, 0x19000, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000880)=""/233, 0xe9}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e00746) shutdown(r3, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000280)=""/218, 0xda}], 0x8}, 0x0) shutdown(r4, 0x0) 15:41:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000280)=""/112, 0x70}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000080)=[{0xffffffffffffff9c}, {}, {}, {}, {}], 0x5, 0x8000000000049) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0054f) poll(&(0x7f0000000080)=[{0xffffffffffffff9c}, {}, {}, {}], 0x4, 0x8000000000049) shutdown(r2, 0x0) 15:41:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000280)=""/112, 0x70}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000080)=[{0xffffffffffffff9c}, {}, {}, {}, {}], 0x5, 0x8000000000049) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0054f) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) poll(&(0x7f0000000080)=[{}, {r3}], 0x2, 0x8000000000049) shutdown(r2, 0x0) 15:41:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x43, &(0x7f0000001200), 0x4) 15:41:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000001780), 0x14) 15:41:37 executing program 0: io_setup(0xc67f, &(0x7f0000000000)) io_submit(0x0, 0x0, 0x0) 15:41:37 executing program 3: openat$incfs(0xffffffffffffff9c, &(0x7f0000000340)='.log\x00', 0x80441, 0x0) 15:41:37 executing program 3: io_setup(0x0, 0x0) io_setup(0x10000, &(0x7f0000000040)) 15:41:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:37 executing program 3: clock_getres(0xf, &(0x7f0000000000)) 15:41:38 executing program 1: add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="82", 0x1, 0xffffffffffffffff) 15:41:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0x1, 0x0, 0x0) 15:41:38 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000000)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 15:41:38 executing program 3: io_setup(0x8, &(0x7f0000000100)) io_setup(0x9, &(0x7f0000000140)) 15:41:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@buf={0x28, &(0x7f00000000c0)="d412297b444ea84177961afc2a037f20e8714f6c241de7c726f645c8b2df2b2588193ca1943fb9b1"}) 15:41:38 executing program 1: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) 15:41:38 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000440)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x3) 15:41:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000019c0)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000001a00)) 15:41:38 executing program 1: io_setup(0x0, &(0x7f0000000000)) io_setup(0x10000, &(0x7f0000000040)) 15:41:38 executing program 2: ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x9102, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:41:38 executing program 0: io_setup(0x8, &(0x7f0000000000)) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) 15:41:38 executing program 3: r0 = socket(0x11, 0x3, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 15:41:38 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000580), 0x40642, 0x0) 15:41:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @ipx={0x4, 0x0, 0x0, "2696528cb629"}, @qipcrtr, @l2={0x1f, 0x0, @fixed, 0x0, 0x2}}) 15:41:38 executing program 0: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x3) 15:41:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:38 executing program 1: io_setup(0x1, &(0x7f0000000000)=0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000080)=[{}], 0x0) io_destroy(r0) 15:41:38 executing program 4: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000400)={{}, {0x0, r0+10000000}}, &(0x7f0000000440)) 15:41:38 executing program 3: getgroups(0x1, &(0x7f0000007cc0)=[0xffffffffffffffff]) 15:41:38 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000001080)={{0x2}}) 15:41:38 executing program 0: io_setup(0xc67f, &(0x7f0000000000)) 15:41:38 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000005580)='ns/ipc\x00') 15:41:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='usefree']) 15:41:38 executing program 3: select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x100000000}, 0x0) 15:41:38 executing program 0: futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x0, 0x2710}, {0x77359400}}) 15:41:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') 15:41:38 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) [ 2352.287584][T30004] FAT-fs (loop2): bogus number of reserved sectors [ 2352.294161][T30004] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2352.392960][T30004] FAT-fs (loop2): bogus number of reserved sectors [ 2352.399524][T30004] FAT-fs (loop2): Can't find a valid FAT filesystem 15:41:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000005480), r0) 15:41:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setregid(0xee00, r1) 15:41:38 executing program 1: add_key$user(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000001300), &(0x7f0000001340)={'syz', 0x1}, &(0x7f0000001380)='{', 0x1, 0xfffffffffffffffd) 15:41:38 executing program 4: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000000300)={{0x77359400}, {0x77359400}}, 0x0) 15:41:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='usefree']) 15:41:39 executing program 0: timer_create(0x7, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, r0+60000000}}, &(0x7f0000000440)) 15:41:39 executing program 1: syz_genetlink_get_family_id$gtp(&(0x7f0000002180), 0xffffffffffffffff) 15:41:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x280000, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @l2tp={0x2, 0x0, @private}, @l2tp={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3c}}, @rc={0x1f, @fixed}, 0xfd}) 15:41:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000040), 0xfea0) 15:41:39 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x9102, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2352.593745][T30055] FAT-fs (loop2): bogus number of reserved sectors [ 2352.600329][T30055] FAT-fs (loop2): Can't find a valid FAT filesystem 15:41:39 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0}], 0x0, &(0x7f00000004c0)=ANY=[]) 15:41:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:39 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f0000000940)={&(0x7f0000000880), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 15:41:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) 15:41:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='usefree']) 15:41:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, "b86df55d31b0701ff858c2861bc4f4001481469b38f0c403e20057b2754d49699f8c47c36cf516d908975454aebddcc750e8b100b69d7baf735cf3998b54575c", "53b8fab8d3e1d168c17fd0c18a94ffb22c4e155a3cae96f162fb5226a14f46929f9cfc70db6748cee6beea083f1d2988b96eb93bb14f4c7d4da20e7b96b1ac86", "0d4968bcabab645eeb5342bde93b3dfaba5fc805cea33893f61f3ffa84ce4ed2", [0x0, 0x4]}) 15:41:39 executing program 1: timer_create(0x0, &(0x7f0000000140)={0x0, 0x8}, &(0x7f0000000180)) 15:41:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:39 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x6, 0x0, 0x0, 0x200800, &(0x7f0000001100)={[{@fat=@flush}, {@rodir}, {@shortname_win95}, {@shortname_lower}, {@utf8}], [{@obj_type={'obj_type', 0x3d, '!+/'}}, {@uid_eq}, {@fowner_gt}, {@fowner_gt={'fowner>', 0xee00}}, {@appraise_type}, {@obj_user={'obj_user', 0x3d, '*$#[['}}, {@subj_type}, {@obj_user}, {@obj_user={'obj_user', 0x3d, '{]%.'}}, {@euid_gt={'euid>', 0xee00}}]}) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) [ 2353.427361][T30095] FAT-fs (loop2): bogus number of reserved sectors [ 2353.434428][T30095] FAT-fs (loop2): Can't find a valid FAT filesystem 15:41:39 executing program 1: syz_open_procfs(0x0, &(0x7f0000000280)='cpuset\x00') 15:41:39 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@uni_xlateno}]}) 15:41:40 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}, {r0, r1+60000000}}, 0x0) timer_gettime(0x0, 0x0) 15:41:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000002a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x100, 0x0) 15:41:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='usefree']) 15:41:40 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000440)={&(0x7f0000000000)=@abs={0x1}, 0x6e, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000100)='I', 0x1}], 0x2}, 0x0) 15:41:40 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000004b40)=[{{&(0x7f0000000040), 0x6e, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, &(0x7f0000004d00)={0x77359400}) [ 2353.569937][T30118] FAT-fs (loop3): bogus number of reserved sectors [ 2353.576502][T30118] FAT-fs (loop3): Can't find a valid FAT filesystem 15:41:40 executing program 4: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000400)={{0x0, 0x989680}}, &(0x7f0000000440)) [ 2353.620536][T30127] FAT-fs (loop2): bogus number of reserved sectors [ 2353.627102][T30127] FAT-fs (loop2): Can't find a valid FAT filesystem 15:41:40 executing program 1: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000c00), 0xffffffffffffffff) 15:41:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="480000001500197f09004b0101048c590188ffffcf5d3474ff9212e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee22600d4ff5bffff9b226452", 0x48}], 0x1) [ 2353.666123][T30118] FAT-fs (loop3): bogus number of reserved sectors [ 2353.672658][T30118] FAT-fs (loop3): Can't find a valid FAT filesystem 15:41:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:40 executing program 4: r0 = semget$private(0x0, 0x2, 0x0) semtimedop(r0, &(0x7f0000000280)=[{0x0, 0x2}, {0x0, 0x0, 0x1000}], 0x2, &(0x7f0000000300)) 15:41:40 executing program 1: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, r0+60000000}}, 0x0) 15:41:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 15:41:40 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client1\x00', 0x0, "f463a01430f94161", "82cccf92d9bc8b4e28ec2bb6164788fde628a7ad960e6e40eab73e6fc9be091f"}) 15:41:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 15:41:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x17, 0x0, &(0x7f0000002940)) 15:41:40 executing program 2: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) 15:41:40 executing program 1: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) 15:41:40 executing program 0: add_key$user(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x3}, &(0x7f00000000c0)="bc", 0x1, 0xfffffffffffffffc) 15:41:40 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc000, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 15:41:40 executing program 2: r0 = socket(0x1, 0x3, 0x0) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1) 15:41:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000001540), 0x4) 15:41:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'team_slave_0\x00', &(0x7f00000022c0)=@ethtool_per_queue_op={0x4b, 0xe}}) 15:41:40 executing program 3: clock_gettime(0x0, &(0x7f0000001300)={0x0, 0x0}) timer_create(0x3, 0x0, &(0x7f0000001400)) timer_settime(0x0, 0x0, &(0x7f0000001340)={{}, {0x0, r0+60000000}}, 0x0) 15:41:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000002c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002042, 0x0) 15:41:40 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 15:41:40 executing program 2: r0 = socket(0x1, 0x3, 0x0) recvmmsg(r0, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x42, 0x0) 15:41:40 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f000000a640)='ns/ipc\x00') 15:41:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x35, {0x0, @hdata="0f54e015a67c55538ed1902bf32f454bee1c885b4bb59fab911a73cab78233bd64e34a7b8f5966310282c801ad23edb7fdb628f074678994a56a92e923e2a4074bed66e9cc2cbb94", @udp_ip4_spec={@remote, @private}}}}) 15:41:40 executing program 4: clock_gettime(0x0, &(0x7f0000001300)={0x0, 0x0}) timer_create(0x3, 0x0, &(0x7f0000001400)) timer_settime(0x0, 0x0, &(0x7f0000001340)={{}, {0x0, r0+60000000}}, 0x0) timer_gettime(0x0, &(0x7f0000000000)) 15:41:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, 0x0, &(0x7f0000000100)) 15:41:40 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001e80), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000001ec0)={0x0, 0x0, 0x0, 'queue0\x00'}) 15:41:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:41 executing program 0: io_setup(0x8, &(0x7f0000000080)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000003e00)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x100000001}]) 15:41:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x8}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x10000074, 0x0, 0x10000, 0x67, 0x4, 0x7, 0x0, 0x40000}, 0x0) preadv(r3, &(0x7f00000017c0), 0x315, 0x800000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006e00)=[{{&(0x7f0000000640)=@generic, 0x80, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000006c0)=""/225, 0xe1}, {&(0x7f00000008c0)=""/243, 0xf3}], 0x3}, 0x80}, {{&(0x7f0000000a00)=@nfc_llcp, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000a80)=""/126, 0x7e}, {&(0x7f0000000b00)=""/13, 0xd}, {&(0x7f0000000b40)=""/132, 0x84}], 0x3}, 0x8000}, {{&(0x7f0000000c40)=@ipx, 0x80, &(0x7f0000001040)=[{&(0x7f0000000cc0)=""/249, 0xf9}, {&(0x7f0000000dc0)=""/141, 0x8d}, {&(0x7f0000000e80)=""/186, 0xba}, {&(0x7f0000003340)=""/4096, 0x1000}, {&(0x7f0000000f40)=""/244, 0xf4}, {&(0x7f0000005340)=""/4096, 0x1000}], 0x6}, 0xfff}, {{&(0x7f00000010c0)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000064c0)=[{&(0x7f0000001140)=""/234, 0xea}, {&(0x7f0000001240)=""/184, 0xb8}, {&(0x7f0000006340)=""/109, 0x6d}, {&(0x7f00000063c0)=""/204, 0xcc}], 0x4, &(0x7f0000006500)=""/139, 0x8b}, 0x9}, {{&(0x7f00000065c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000006880)=[{&(0x7f0000006640)}, {&(0x7f0000006680)=""/200, 0xc8}, {&(0x7f0000006780)=""/114, 0x72}, {&(0x7f0000006800)=""/43, 0x2b}, {&(0x7f0000006840)}], 0x5, &(0x7f0000006900)=""/135, 0x87}, 0x6}, {{&(0x7f00000069c0)=@in6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f0000006ac0)=[{&(0x7f0000006a40)=""/128, 0x80}], 0x1, &(0x7f0000006b00)=""/146, 0x92}, 0x2}, {{&(0x7f0000006bc0)=@isdn, 0x80, &(0x7f0000006d40)=[{&(0x7f0000006c40)=""/227, 0xe3}], 0x1, &(0x7f0000006d80)=""/95, 0x5f}, 0x5548c899}], 0x7, 0x10001, 0x0) r4 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) mkdirat(r4, &(0x7f0000000040)='./file1\x00', 0x0) 15:41:41 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f000000d240)='ns/user\x00') 15:41:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000052c0)={'syztnl2\x00', 0x0}) 15:41:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 15:41:41 executing program 4: perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) 15:41:41 executing program 1: io_setup(0x1, &(0x7f0000000000)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000000640)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0, 0x0, 0xca6}]) 15:41:41 executing program 3: timer_create(0x9, 0x0, &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000000)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {r0}}, &(0x7f0000000080)) 15:41:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000280), 0x4) 15:41:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x6}, 0x4) 15:41:41 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x1d, 0x4, @tid=r0}, &(0x7f00000000c0)) 15:41:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x36, 0x0, "056deda8b2adb019dd9970d1958be0018afaf586519e039fa95cd9d76e258f24b327cdca1e4df61a9f91140f2476929c84ceb025c4766e50ff2c9688a9a86dce4c91b8b248b49e4df53f0f9c47aa0386"}, 0xd8) 15:41:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x0, 0x0, 0x11, &(0x7f0000000080)="229b7fb1056ba67f31ff5ae8ef73346c4b"}) 15:41:42 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, 0x0) 15:41:42 executing program 0: io_setup(0x7fff, &(0x7f0000000000)) 15:41:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) semctl$SETALL(0x0, 0x0, 0x11, 0x0) 15:41:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1\x00', 0x0}) 15:41:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)={[{@fat=@usefree}]}) 15:41:42 executing program 1: setregid(0xee00, 0x0) setregid(0xee00, 0x0) 15:41:42 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc000, 0x0) [ 2355.605065][T30314] FAT-fs (loop3): bogus number of reserved sectors [ 2355.611602][T30314] FAT-fs (loop3): Can't find a valid FAT filesystem 15:41:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, 0x0, &(0x7f0000000100)) 15:41:42 executing program 0: io_setup(0x1, &(0x7f0000000000)) io_setup(0x9, &(0x7f0000000040)) io_setup(0x5, &(0x7f00000017c0)=0x0) io_destroy(r0) 15:41:42 executing program 2: r0 = getpid() sched_getaffinity(r0, 0x8, &(0x7f0000001780)) 15:41:42 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)=ANY=[], 0x4c}}, 0x0) [ 2355.704849][T30314] FAT-fs (loop3): bogus number of reserved sectors [ 2355.711400][T30314] FAT-fs (loop3): Can't find a valid FAT filesystem 15:41:42 executing program 4: io_setup(0x9, &(0x7f0000000140)=0x0) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 15:41:42 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) lseek(r0, 0x8, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000340)=0x3, 0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x80, 0x6, 0x80, 0x81, 0x1, 0x0, 0x80000000, 0x40000, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1f, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x4820, 0x3, 0x4, 0x6, 0x1, 0x6, 0xc1, 0x0, 0xc4, 0x0, 0x31b780}, 0xffffffffffffffff, 0x8, r0, 0xd) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0xb5, 0x1, 0x80, 0x0, 0xf82f, 0x1008, 0xb, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x2, @perf_bp={&(0x7f0000000140)}, 0x112, 0x800, 0x3ff, 0x0, 0x4582, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x4, 0xffffffffffffffff, 0x9) r1 = socket$netlink(0x10, 0x3, 0x10) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000080)="480000001500197f09004b0101048c590188ffffcf5d3474ff9212e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee22600d4ff5bffff9b226452", 0x48}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000016c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005cd80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x1, "07adf4c967778a"}) 15:41:42 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00') 15:41:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000001600), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000001680)) 15:41:42 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000007980)='.pending_reads\x00', 0x40, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) 15:41:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 15:41:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000001080)=""/11, &(0x7f0000007300)=0xb) 15:41:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3}]) 15:41:42 executing program 2: syz_open_procfs$userns(0x0, &(0x7f0000000240)) 15:41:42 executing program 0: io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000003e00)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x0, r1, 0x0}]) 15:41:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='macvtap0\x00'}) syz_open_dev$loop(&(0x7f0000000000), 0x8, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl1\x00', r1, 0x4, 0x1f, 0x81, 0x9, 0xe, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8000, 0x8000, 0x3ff, 0x1000}}) 15:41:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000280), 0x4) 15:41:42 executing program 2: syz_open_procfs(0x0, &(0x7f0000000680)='net/ip6_tables_names\x00') 15:41:42 executing program 4: io_setup(0x1, &(0x7f0000000000)) io_setup(0x5, &(0x7f00000017c0)=0x0) io_destroy(r0) 15:41:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:42 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x2400c891) 15:41:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000001c0)=@get={0x1, 0x0}) 15:41:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, 0x0, &(0x7f0000000100)) 15:41:42 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000300)={{}, {0x9}}) 15:41:42 executing program 4: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x20101) 15:41:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140), 0x4) 15:41:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) 15:41:42 executing program 0: clock_gettime(0x0, &(0x7f0000000040)) io_setup(0x3, &(0x7f0000000140)) 15:41:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000280), 0x4) 15:41:42 executing program 4: timer_create(0x9cb9ef8cd7523efe, 0x0, &(0x7f0000000400)) 15:41:42 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) lseek(r0, 0x8, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000340)=0x3, 0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000080)="480000001500197f09004b0101048c590188ffffcf5d3474ff9212e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee22600d4ff5bffff9b226452", 0x48}], 0x1) 15:41:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:41:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x10, 0x2}, 0x10) 15:41:43 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='vegas\x00', 0x6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000000c0)='cubic\x00', 0x3) 15:41:43 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f00000003c0)='.\x00', 0x40000, 0x0) 15:41:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000840)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1000}, 0x14) 15:41:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000200)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@resgid={'resgid', 0x3d, 0xee00}}]}) 15:41:43 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 2356.722121][T30485] loop3: detected capacity change from 0 to 4 [ 2356.737841][T30485] EXT4-fs (loop3): Can't read superblock on 2nd try 15:41:43 executing program 4: shmget$private(0x0, 0x1000, 0x4, &(0x7f0000003000/0x1000)=nil) 15:41:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000), 0x4) 15:41:43 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) [ 2356.804823][T30485] loop3: detected capacity change from 0 to 4 [ 2356.814836][T30485] EXT4-fs (loop3): Can't read superblock on 2nd try 15:41:43 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x440, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x2400, 0x4) 15:41:43 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 15:41:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:41:43 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x23, &(0x7f0000000040)=""/56, &(0x7f0000000400)=0x38) 15:41:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000340), 0x4) 15:41:43 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) utimensat(r0, 0x0, 0x0, 0x100) 15:41:43 executing program 0: socket(0x0, 0xe973217d3636d14f, 0x0) 15:41:43 executing program 2: r0 = getpid() prlimit64(r0, 0xa, 0x0, &(0x7f0000000000)) 15:41:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) 15:41:43 executing program 0: open$dir(&(0x7f0000000040)='./file0\x00', 0x440, 0x40) 15:41:43 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x440, 0x1e1) 15:41:43 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x30000, 0x0) 15:41:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f00000010c0)) 15:41:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{}, "7d828b14329eca38", "2f6606cd279f5083310710cca5810973f9f020ffcac06bb86dd51800", "3b117b90", "eb86cfcbf16e3a41"}, 0x38) 15:41:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:41:43 executing program 4: clock_gettime(0x1, &(0x7f00000001c0)) 15:41:43 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x440, 0x44) 15:41:43 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x490) 15:41:43 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, 0x0, 0x0) 15:41:43 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) 15:41:43 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x40040, 0x191) 15:41:43 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 15:41:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f00000000c0)) 15:41:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16, @ANYBLOB='\f'], 0x20}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), r0) 15:41:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000040)={@initdev, @remote}, &(0x7f0000000080)=0xc) 15:41:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000040)) 15:41:44 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:41:44 executing program 1: getresgid(&(0x7f0000000540), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) r1 = getegid() setresgid(0x0, r1, r0) 15:41:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) 15:41:44 executing program 3: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x24) 15:41:44 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 15:41:44 executing program 4: clock_gettime(0x3, &(0x7f0000000180)) 15:41:44 executing program 0: utimensat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) 15:41:44 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 15:41:44 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x185000, 0x0) 15:41:44 executing program 1: prlimit64(0x0, 0x6, 0x0, &(0x7f0000000080)) 15:41:44 executing program 4: openat$random(0xffffffffffffff9c, &(0x7f00000000c0), 0x22102, 0x0) 15:41:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0x541b, 0x0) socket$nl_route(0x10, 0x3, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000000)={'NETMAP\x00'}, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="3c07000001000047a90000000000000000000105020000000100011a47f6fa49b47d8e6a8acdb86b810afeaaec9cf46c34c7583850d80502000100"], 0x48) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000600)) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @empty}, 0x10) r3 = accept$inet6(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e20, 0x3, @ipv4={'\x00', '\xff\xff', @remote}, 0xc24}, {0xa, 0x0, 0x0, @local}, 0x0, [0xfff, 0x1ff, 0x6]}, 0x5c) setsockopt$inet6_buf(r3, 0x29, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2b, &(0x7f0000000200)={0x8, {{0xa, 0x4e21, 0x1, @private2, 0x7}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x82d) 15:41:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, 0x0, 0x0) 15:41:44 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) io_setup(0x0, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000001ac0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 15:41:44 executing program 1: rt_sigaction(0x21, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000100)) 15:41:44 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x4c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x11) 15:41:44 executing program 2: symlinkat(&(0x7f0000000140)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) 15:41:44 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, 0x0, 0x0) 15:41:44 executing program 4: mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10, 0x103) 15:41:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 15:41:44 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 15:41:44 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) 15:41:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x64010102}, 0x10) 15:41:45 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x20100, 0x0) 15:41:45 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) 15:41:45 executing program 1: r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x290) 15:41:45 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) 15:41:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 15:41:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, 0x0, 0x0) 15:41:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) 15:41:45 executing program 0: open$dir(&(0x7f0000000180)='./file0\x00', 0x20240, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x101802, 0xb) 15:41:45 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) 15:41:45 executing program 2: prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) 15:41:45 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x412101, 0x0) 15:41:45 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x240140, 0x0) 15:41:45 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mknodat$null(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x103) 15:41:45 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x8000, 0x1) 15:41:45 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x12d140, 0x0) 15:41:45 executing program 1: shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) 15:41:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 15:41:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, 0x0, 0x0) 15:41:45 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) 15:41:45 executing program 4: mkdirat(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x0) 15:41:45 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, 0x0, 0x0) 15:41:45 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4202, 0x4d) 15:41:45 executing program 0: open$dir(&(0x7f0000000140)='./file0\x00', 0x20440, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x0) 15:41:45 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20c40, 0x20) 15:41:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000140)) 15:41:45 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x141, 0x3d) 15:41:45 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x42040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80000, 0xbc) 15:41:45 executing program 3: execveat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 15:41:45 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x2400, 0x0) 15:41:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 15:41:45 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 15:41:45 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x801, 0x0) 15:41:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000100), &(0x7f0000000140)=0x10) 15:41:45 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) 15:41:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) 15:41:45 executing program 4: shmget$private(0x0, 0x2000, 0x78000000, &(0x7f0000ffe000/0x2000)=nil) 15:41:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 15:41:45 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000001480)=""/114) 15:41:45 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:45 executing program 2: syz_open_procfs(0x0, &(0x7f0000000300)='oom_score\x00') 15:41:45 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1, 0x6, 0x0) 15:41:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:41:45 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0x4020940d, 0x0) 15:41:45 executing program 0: openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000480)='net/nf_conntrack\x00') 15:41:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x127a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4c6da010d5bb8085edfe2568641b563d1a59fc872d037bae83687d0be82132cd6d23e9438cbae43aa072f647b269c2941b65be645192902da880c40366d8d71", "8eca7338a3d02e25e6bd4a5bbed7c7f6122246ddb4a65e9d991aab418339ad9e0d522d6af25b358f93ba67740723d77ca595f83a4f8ada611a12dde6e45e419b", "acb03600f307486f5d56006dc2a19ca4c90995b58191a8c465ec5e31c0c32f9b"}) 15:41:45 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0x6681, 0x0) 15:41:45 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0x40383d03, &(0x7f00000003c0)) 15:41:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x82) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 15:41:46 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x0, 0x0}) 15:41:46 executing program 3: clock_nanosleep(0xfffffffffffffff0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0) 15:41:46 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000001580)) 15:41:46 executing program 0: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 15:41:46 executing program 5: socketpair(0x10, 0x2, 0xb26, &(0x7f0000000000)) 15:41:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x301, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4c6da010d5bb8085edfe2568641b563d1a59fc872d037bae83687d0be82132cd6d23e9438cbae43aa072f647b269c2941b65be645192902da880c40366d8d71", "8eca7338a3d02e25e6bd4a5bbed7c7f6122246ddb4a65e9d991aab418339ad9e0d522d6af25b358f93ba67740723d77ca595f83a4f8ada611a12dde6e45e419b", "acb03600f307486f5d56006dc2a19ca4c90995b58191a8c465ec5e31c0c32f9b"}) 15:41:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0xc0481273, 0x0) 15:41:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x127f, 0x0) 15:41:46 executing program 0: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/46) 15:41:46 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='gid_map\x00') 15:41:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c05, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4c6da010d5bb8085edfe2568641b563d1a59fc872d037bae83687d0be82132cd6d23e9438cbae43aa072f647b269c2941b65be645192902da880c40366d8d71", "8eca7338a3d02e25e6bd4a5bbed7c7f6122246ddb4a65e9d991aab418339ad9e0d522d6af25b358f93ba67740723d77ca595f83a4f8ada611a12dde6e45e419b", "acb03600f307486f5d56006dc2a19ca4c90995b58191a8c465ec5e31c0c32f9b"}) 15:41:46 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0x40049409, &(0x7f00000003c0)) 15:41:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4c6da010d5bb8085edfe2568641b563d1a59fc872d037bae83687d0be82132cd6d23e9438cbae43aa072f647b269c2941b65be645192902da880c40366d8d71", "8eca7338a3d02e25e6bd4a5bbed7c7f6122246ddb4a65e9d991aab418339ad9e0d522d6af25b358f93ba67740723d77ca595f83a4f8ada611a12dde6e45e419b", "acb03600f307486f5d56006dc2a19ca4c90995b58191a8c465ec5e31c0c32f9b"}) 15:41:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$BLKGETSIZE(r0, 0x127c, &(0x7f00000015c0)) 15:41:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) 15:41:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x1262, 0x0) 15:41:46 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0x40383d0c, &(0x7f00000003c0)) 15:41:46 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0x40603d10, &(0x7f00000003c0)) 15:41:46 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0403d11, 0x0) 15:41:46 executing program 4: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{0x3}}) 15:41:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5418, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "ca0a9f255c18d4863cd68478e941b0e24cc00d"}) 15:41:46 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) 15:41:46 executing program 1: socketpair(0xf, 0x0, 0x0, &(0x7f0000001040)) 15:41:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x0, 0x12, 0x0, 0x0, "7a72179929f3f04bab9ba097785b2d147111bec63624292db5de02eee4b6d03c72228eb3924d57988790c4e03d0bc8f76ae46e90ceb2154e5298fbab0da8478d", "1e56c620eb58ffe4fcaacf4afc322d5244470b4484db0e381c42efd0a42608e9"}) 15:41:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4c6da010d5bb8085edfe2568641b563d1a59fc872d037bae83687d0be82132cd6d23e9438cbae43aa072f647b269c2941b65be645192902da880c40366d8d71", "8eca7338a3d02e25e6bd4a5bbed7c7f6122246ddb4a65e9d991aab418339ad9e0d522d6af25b358f93ba67740723d77ca595f83a4f8ada611a12dde6e45e419b", "acb03600f307486f5d56006dc2a19ca4c90995b58191a8c465ec5e31c0c32f9b"}) 15:41:46 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0189436, &(0x7f00000003c0)) 15:41:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x541b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4c6da010d5bb8085edfe2568641b563d1a59fc872d037bae83687d0be82132cd6d23e9438cbae43aa072f647b269c2941b65be645192902da880c40366d8d71", "8eca7338a3d02e25e6bd4a5bbed7c7f6122246ddb4a65e9d991aab418339ad9e0d522d6af25b358f93ba67740723d77ca595f83a4f8ada611a12dde6e45e419b", "acb03600f307486f5d56006dc2a19ca4c90995b58191a8c465ec5e31c0c32f9b"}) 15:41:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x80) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/consoles\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 15:41:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 15:41:46 executing program 2: socket(0x0, 0x8000b, 0x0) 15:41:46 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 15:41:47 executing program 4: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{0x3}}) 15:41:47 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0403d08, 0x0) 15:41:47 executing program 3: socketpair(0xa, 0x2, 0x0, &(0x7f0000000340)) 15:41:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$BLKGETSIZE(r0, 0x1278, &(0x7f00000015c0)) 15:41:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x125f, 0x0) 15:41:47 executing program 0: pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r2, &(0x7f0000000000)='cubic\x00', 0x5) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 15:41:47 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000004b80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, 0x0}}], 0x2, 0x0) 15:41:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$BLKGETSIZE(r0, 0x1267, &(0x7f00000015c0)) 15:41:47 executing program 2: pipe(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000}, 0x0, 0x20000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000780)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xdd\xa8\x86I.\xc3\x9aQ\xc8\x8e%U\xda\xbd\x10\xf9\xd7q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa8K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,g8\xddGdF(\xeaN\xbcSoz\xe5.c\xdf\x8b\xd2m}\xc7D\x98\xd4\xfd\xc8\x18@0,c9:\x95z\xe2\xa9\xcf\xd2\x90*\xaa\xc0W.\xcb|.F_E\xd4\r\xa9\xc8\v\x19Fj\x8c\b\xcb\xf7\xefw\x00\x00\x00\x00\x82/r\x0egC\xa1\x98\xa5\x9ad\x8fV\xad\f\xe1Px\xf6\x19aM\v\xbfY1\xab\\\x8e\xf1\xdfp\x89\x03\xa1w`\x87\x84\x991\x18\xbf\xd5\xc5G\aK\xf0\xfdF-\x9aF\x05\x05\xf6\x95\xb0F{\x10\x93\xba\x81\xbc\xee\xb4/X\x1fd\xde\x00\x7f|;\xb3\xe3\x04\x8c=\xc8;\xce\xec\xdfF\x03\f\xe2\xc6G\xfc\xa7\xd9\x0e\\\xb4\x9c\":\xa5\xc6Z\x12\xbe\x1f\xe1;H\x7f\x9dD\xe5\xd2LS\x81\x152\xdf\x81\x93Xlv\xc7\x0e\xa0u\x9f\xbdUv\xe0\xfb\xa0\x19\x91\xce\xd6\x1f\x93|u\x9f\xeaL\xc0\xd3f\xbab2\r\xec\xb3\x1c\xff\x8eQc\xd0Z\xcc\x94\xc9^xu\xfc\xb4\vX\x90\v\xf3yT&MSF\b`\v\xea\x10\xd7\xad\xc0\xdaty\xf1h|\xea\xd8\xbc\xf1\xe4\xadN\xc0\xbc\xe5 \\\x7f5oT\\\xac\xd6=q\x88q\xcc<7\x83\xaa\xf0\xb8e+\x13\xf1^I\xcb~~\x11`B\xdf\xf1xB/,\xd1\xe6\x17\xb2\x7f\xb6v\a\f1\xa8\xfe\xd6\xedG\x1b7\x01\x0fH%\x0fd\x8csRb\x03\xc9\x15jG`\x98\xef\x85\x12\xe3\x90\x96\x91\xf9\xbc\xdf\xd2s\xc9:\t\xad\xdbM\xb4\xa3\xc7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00O\x97\xd7\xc8\xc9,\xadB\xfb\xa1g\xef\x1d*\xa6\xf2\xb4\xd9\x9bYy\xa6_\xeb\xc1#F\xcd\x1fC\xe6\x9cL\xa4F\x17\x1b\n\xf9\xf3b\xcc>0\xc2\f\\>\x93o\xf6\x88\r\xd1\x8a\xc7\xb7qd=iZ\xbd\x15Rv\xdb|\x86\xbf\xce\x1b\x8f\xfew7QQv\xd5\xa0\xa1\x00\x00\x00\x00\x00\x00\x00e\xa2\x11\x8b(nNx(\xeb\x00\x00\x00\x00\x00\x00\x00\x00\xd0E\x1a\x91\x8a\\\xdb\xaf\xfd~\xacK\xd4\'B\x9f|\xa3.\xa9\xffy\xad|\xb7Te\xee\xa0\xd5\xfc\xce\xb0\xf0X?\t\x9e\xc9j\xad\xb5Z\x97\xa3\x9a\xe3\f\xd4e\x88\xdb;\xaeTY\xb8\xd3;\xb0\xf8\x02\x00\xa0k\xae@\x86@\x02\xa2\x88P\xe5\xf6\xaf\x82Z\x85\x9eQ\xa3\x1aFKbS\xba\xd4\x9a\x92\x82X\x1f\"\tOB,\r-\xfd\xe0\r\xf0\xecR\xb7\xe5f\x84\x12kIG4\x99\x9c\x00\x8f\xacY\t\xf2\xe6\x7fx\xf5;\x17:\xe4\x19\xcbc\xffY\xc6QY\"_(\xdby\x06\xd4\xa6\x81\xd3W\xfa\xec\x99z\"K\xf5\xb4\xfb\xf3f\xb9\xa8\x9c6E\x9d\x19\xc8v\xa2\xc4\xd7\ns\xafa\xa1\x80\xe5\x00\x00\x00\x00\x00\x00\x00\x00\x00\r', 0x0) ftruncate(r0, 0x1000000) r1 = memfd_create(&(0x7f0000000340)='@vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f\t\x00\x00\x00\x00\x80\x00\x00.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83\xcd\xaccy\x01\x93\xde\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3', 0x0) ftruncate(r1, 0x1000000) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x101202, 0x0) sendfile(r2, r1, 0x0, 0xeefffdef) sendfile(r1, r0, 0x0, 0xeefffdef) 15:41:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c902d4b66730700000000100801000240008000f801", 0x17}, {0x0, 0x0, 0x7ff}], 0x0, &(0x7f0000000080)) 15:41:47 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000500)=0xb34, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 15:41:47 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001100)=[{&(0x7f00000000c0)="ce", 0x1}], 0x1000000000000043, 0x0) 15:41:48 executing program 4: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{0x3}}) 15:41:48 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x1, 0x1, 'queue1\x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x305, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0xfd63) 15:41:48 executing program 3: pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000001380)}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0x92c) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x0, "682d17f731c641bc4213b511cdfdb40917a308"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000090000000900000000001000"}) 15:41:48 executing program 2: pipe(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000}, 0x0, 0x20000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000780)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xdd\xa8\x86I.\xc3\x9aQ\xc8\x8e%U\xda\xbd\x10\xf9\xd7q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa8K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,g8\xddGdF(\xeaN\xbcSoz\xe5.c\xdf\x8b\xd2m}\xc7D\x98\xd4\xfd\xc8\x18@0,c9:\x95z\xe2\xa9\xcf\xd2\x90*\xaa\xc0W.\xcb|.F_E\xd4\r\xa9\xc8\v\x19Fj\x8c\b\xcb\xf7\xefw\x00\x00\x00\x00\x82/r\x0egC\xa1\x98\xa5\x9ad\x8fV\xad\f\xe1Px\xf6\x19aM\v\xbfY1\xab\\\x8e\xf1\xdfp\x89\x03\xa1w`\x87\x84\x991\x18\xbf\xd5\xc5G\aK\xf0\xfdF-\x9aF\x05\x05\xf6\x95\xb0F{\x10\x93\xba\x81\xbc\xee\xb4/X\x1fd\xde\x00\x7f|;\xb3\xe3\x04\x8c=\xc8;\xce\xec\xdfF\x03\f\xe2\xc6G\xfc\xa7\xd9\x0e\\\xb4\x9c\":\xa5\xc6Z\x12\xbe\x1f\xe1;H\x7f\x9dD\xe5\xd2LS\x81\x152\xdf\x81\x93Xlv\xc7\x0e\xa0u\x9f\xbdUv\xe0\xfb\xa0\x19\x91\xce\xd6\x1f\x93|u\x9f\xeaL\xc0\xd3f\xbab2\r\xec\xb3\x1c\xff\x8eQc\xd0Z\xcc\x94\xc9^xu\xfc\xb4\vX\x90\v\xf3yT&MSF\b`\v\xea\x10\xd7\xad\xc0\xdaty\xf1h|\xea\xd8\xbc\xf1\xe4\xadN\xc0\xbc\xe5 \\\x7f5oT\\\xac\xd6=q\x88q\xcc<7\x83\xaa\xf0\xb8e+\x13\xf1^I\xcb~~\x11`B\xdf\xf1xB/,\xd1\xe6\x17\xb2\x7f\xb6v\a\f1\xa8\xfe\xd6\xedG\x1b7\x01\x0fH%\x0fd\x8csRb\x03\xc9\x15jG`\x98\xef\x85\x12\xe3\x90\x96\x91\xf9\xbc\xdf\xd2s\xc9:\t\xad\xdbM\xb4\xa3\xc7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00O\x97\xd7\xc8\xc9,\xadB\xfb\xa1g\xef\x1d*\xa6\xf2\xb4\xd9\x9bYy\xa6_\xeb\xc1#F\xcd\x1fC\xe6\x9cL\xa4F\x17\x1b\n\xf9\xf3b\xcc>0\xc2\f\\>\x93o\xf6\x88\r\xd1\x8a\xc7\xb7qd=iZ\xbd\x15Rv\xdb|\x86\xbf\xce\x1b\x8f\xfew7QQv\xd5\xa0\xa1\x00\x00\x00\x00\x00\x00\x00e\xa2\x11\x8b(nNx(\xeb\x00\x00\x00\x00\x00\x00\x00\x00\xd0E\x1a\x91\x8a\\\xdb\xaf\xfd~\xacK\xd4\'B\x9f|\xa3.\xa9\xffy\xad|\xb7Te\xee\xa0\xd5\xfc\xce\xb0\xf0X?\t\x9e\xc9j\xad\xb5Z\x97\xa3\x9a\xe3\f\xd4e\x88\xdb;\xaeTY\xb8\xd3;\xb0\xf8\x02\x00\xa0k\xae@\x86@\x02\xa2\x88P\xe5\xf6\xaf\x82Z\x85\x9eQ\xa3\x1aFKbS\xba\xd4\x9a\x92\x82X\x1f\"\tOB,\r-\xfd\xe0\r\xf0\xecR\xb7\xe5f\x84\x12kIG4\x99\x9c\x00\x8f\xacY\t\xf2\xe6\x7fx\xf5;\x17:\xe4\x19\xcbc\xffY\xc6QY\"_(\xdby\x06\xd4\xa6\x81\xd3W\xfa\xec\x99z\"K\xf5\xb4\xfb\xf3f\xb9\xa8\x9c6E\x9d\x19\xc8v\xa2\xc4\xd7\ns\xafa\xa1\x80\xe5\x00\x00\x00\x00\x00\x00\x00\x00\x00\r', 0x0) ftruncate(r0, 0x1000000) r1 = memfd_create(&(0x7f0000000340)='@vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f\t\x00\x00\x00\x00\x80\x00\x00.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83\xcd\xaccy\x01\x93\xde\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3', 0x0) ftruncate(r1, 0x1000000) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x101202, 0x0) sendfile(r2, r1, 0x0, 0xeefffdef) sendfile(r1, r0, 0x0, 0xeefffdef) 15:41:48 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x1, 0x0, 'queue1\x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x305, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0xfd63) 15:41:48 executing program 3: socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x1c34d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000553000/0x1000)=nil, 0x1000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xfffffe5e) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002080)='net/tcp\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000100)=""/182, 0xb6}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:41:48 executing program 0: pipe(0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x7]}, 0x8, 0x800) fcntl$setstatus(r0, 0x4, 0x46800) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000, 0x7ff}, 0x0, 0x20000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000780)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xdd\xa8\x86I.\xc3\x9aQ\xc8\x8e%U\xda\xbd\x10\xf9\xd7q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa8K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,g8\xddGdF(\xeaN\xbcSoz\xe5.c\xdf\x8b\xd2m}\xc7D\x98\xd4\xfd\xc8\x18@0,c9:\x95z\xe2\xa9\xcf\xd2\x90*\xaa\xc0W.\xcb|.F_E\xd4\r\xa9\xc8\v\x19Fj\x8c\b\xcb\xf7\xefw\x00\x00\x00\x00\x82/r\x0egC\xa1\x98\xa5\x9ad\x8fV\xad\f\xe1Px\xf6\x19aM\v\xbfY1\xab\\\x8e\xf1\xdfp\x89\x03\xa1w`\x87\x84\x991\x18\xbf\xd5\xc5G\aK\xf0\xfdF-\x9aF\x05\x05\xf6\x95\xb0F{\x10\x93\xba\x81\xbc\xee\xb4/X\x1fd\xde\x00\x7f|;\xb3\xe3\x04\x8c=\xc8;\xce\xec\xdfF\x03\f\xe2\xc6G\xfc\xa7\xd9\x0e\\\xb4\x9c\":\xa5\xc6Z\x12\xbe\x1f\xe1;H\x7f\x9dD\xe5\xd2LS\x81\x152\xdf\x81\x93Xlv\xc7\x0e\xa0u\x9f\xbdUv\xe0\xfb\xa0\x19\x91\xce\xd6\x1f\x93|u\x9f\xeaL\xc0\xd3f\xbab2\r\xec\xb3\x1c\xff\x8eQc\xd0Z\xcc\x94\xc9^xu\xfc\xb4\vX\x90\v\xf3yT&MSF\b`\v\xea\x10\xd7\xad\xc0\xdaty\xf1h|\xea\xd8\xbc\xf1\xe4\xadN\xc0\xbc\xe5 \\\x7f5oT\\\xac\xd6=q\x88q\xcc<7\x83\xaa\xf0\xb8e+\x13\xf1^I\xcb~~\x11`B\xdf\xf1xB/,\xd1\xe6\x17\xb2\x7f\xb6v\a\f1\xa8\xfe\xd6\xedG\x1b7\x01\x0fH%\x0fd\x8csRb\x03\xc9\x15jG`\x98\xef\x85\x12\xe3\x90\x96\x91\xf9\xbc\xdf\xd2s\xc9:\t\xad\xdbM\xb4\xa3\xc7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00O\x97\xd7\xc8\xc9,\xadB\xfb\xa1g\xef\x1d*\xa6\xf2\xb4\xd9\x9bYy\xa6_\xeb\xc1#F\xcd\x1fC\xe6\x9cL\xa4F\x17\x1b\n\xf9\xf3b\xcc>0\xc2\f\\>\x93o\xf6\x88\r\xd1\x8a\xc7\xb7qd=iZ\xbd\x15Rv\xdb|\x86\xbf\xce\x1b\x8f\xfew7QQv\xd5\xa0\xa1\x00\x00\x00\x00\x00\x00\x00e\xa2\x11\x8b(nNx(\xeb\x00\x00\x00\x00\x00\x00\x00\x00\xd0E\x1a\x91\x8a\\\xdb\xaf\xfd~\xacK\xd4\'B\x9f|\xa3.\xa9\xffy\xad|\xb7Te\xee\xa0\xd5\xfc\xce\xb0\xf0X?\t\x9e\xc9j\xad\xb5Z\x97\xa3\x9a\xe3\f\xd4e\x88\xdb;\xaeTY\xb8\xd3;\xb0\xf8\x02\x00\xa0k\xae@\x86@\x02\xa2\x88P\xe5\xf6\xaf\x82Z\x85\x9eQ\xa3\x1aFKbS\xba\xd4\x9a\x92\x82X\x1f\"\tOB,\r-\xfd\xe0\r\xf0\xecR\xb7\xe5f\x84\x12kIG4\x99\x9c\x00\x8f\xacY\t\xf2\xe6\x7fx\xf5;\x17:\xe4\x19\xcbc\xffY\xc6QY\"_(\xdby\x06\xd4\xa6\x81\xd3W\xfa\xec\x99z\"K\xf5\xb4\xfb\xf3f\xb9\xa8\x9c6E\x9d\x19\xc8v\xa2\xc4\xd7\ns\xafa\xa1\x80\xe5\x00\x00\x00\x00\x00\x00\x00\x00\x00\r', 0x0) ftruncate(r1, 0x1000000) r2 = memfd_create(&(0x7f0000000340)='@vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f\t\x00\x00\x00\x00\x80\x00\x00.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83\xcd\xaccy\x01\x93\xde\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3', 0x0) ftruncate(r2, 0x1000000) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x101202, 0x0) sendfile(r3, r2, 0x0, 0xeefffdef) sendfile(r2, r1, 0x0, 0xeefffdef) 15:41:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x26141, 0x0) 15:41:48 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000001) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x400001000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 15:41:48 executing program 1: sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x2bb98205) signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x7]}, 0x8, 0x800) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) r0 = memfd_create(&(0x7f0000000780)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xdd\xa8\x86I.\xc3\x9aQ\xc8\x8e%U\xda\xbd\x10\xf9\xd7q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa8K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,g8\xddGdF(\xeaN\xbcSoz\xe5.c\xdf\x8b\xd2m}\xc7D\x98\xd4\xfd\xc8\x18@0,c9:\x95z\xe2\xa9\xcf\xd2\x90*\xaa\xc0W.\xcb|.F_E\xd4\r\xa9\xc8\v\x19Fj\x8c\b\xcb\xf7\xefw\x00\x00\x00\x00\x82/r\x0egC\xa1\x98\xa5\x9ad\x8fV\xad\f\xe1Px\xf6\x19aM\v\xbfY1\xab\\\x8e\xf1\xdfp\x89\x03\xa1w`\x87\x84\x991\x18\xbf\xd5\xc5G\aK\xf0\xfdF-\x9aF\x05\x05\xf6\x95\xb0F{\x10\x93\xba\x81\xbc\xee\xb4/X\x1fd\xde\x00\x7f|;\xb3\xe3\x04\x8c=\xc8;\xce\xec\xdfF\x03\f\xe2\xc6G\xfc\xa7\xd9\x0e\\\xb4\x9c\":\xa5\xc6Z\x12\xbe\x1f\xe1;H\x7f\x9dD\xe5\xd2LS\x81\x152\xdf\x81\x93Xlv\xc7\x0e\xa0u\x9f\xbdUv\xe0\xfb\xa0\x19\x91\xce\xd6\x1f\x93|u\x9f\xeaL\xc0\xd3f\xbab2\r\xec\xb3\x1c\xff\x8eQc\xd0Z\xcc\x94\xc9^xu\xfc\xb4\vX\x90\v\xf3yT&MSF\b`\v\xea\x10\xd7\xad\xc0\xdaty\xf1h|\xea\xd8\xbc\xf1\xe4\xadN\xc0\xbc\xe5 \\\x7f5oT\\\xac\xd6=q\x88q\xcc<7\x83\xaa\xf0\xb8e+\x13\xf1^I\xcb~~\x11`B\xdf\xf1xB/,\xd1\xe6\x17\xb2\x7f\xb6v\a\f1\xa8\xfe\xd6\xedG\x1b7\x01\x0fH%\x0fd\x8csRb\x03\xc9\x15jG`\x98\xef\x85\x12\xe3\x90\x96\x91\xf9\xbc\xdf\xd2s\xc9:\t\xad\xdbM\xb4\xa3\xc7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00O\x97\xd7\xc8\xc9,\xadB\xfb\xa1g\xef\x1d*\xa6\xf2\xb4\xd9\x9bYy\xa6_\xeb\xc1#F\xcd\x1fC\xe6\x9cL\xa4F\x17\x1b\n\xf9\xf3b\xcc>0\xc2\f\\>\x93o\xf6\x88\r\xd1\x8a\xc7\xb7qd=iZ\xbd\x15Rv\xdb|\x86\xbf\xce\x1b\x8f\xfew7QQv\xd5\xa0\xa1\x00\x00\x00\x00\x00\x00\x00e\xa2\x11\x8b(nNx(\xeb\x00\x00\x00\x00\x00\x00\x00\x00\xd0E\x1a\x91\x8a\\\xdb\xaf\xfd~\xacK\xd4\'B\x9f|\xa3.\xa9\xffy\xad|\xb7Te\xee\xa0\xd5\xfc\xce\xb0\xf0X?\t\x9e\xc9j\xad\xb5Z\x97\xa3\x9a\xe3\f\xd4e\x88\xdb;\xaeTY\xb8\xd3;\xb0\xf8\x02\x00\xa0k\xae@\x86@\x02\xa2\x88P\xe5\xf6\xaf\x82Z\x85\x9eQ\xa3\x1aFKbS\xba\xd4\x9a\x92\x82X\x1f\"\tOB,\r-\xfd\xe0\r\xf0\xecR\xb7\xe5f\x84\x12kIG4\x99\x9c\x00\x8f\xacY\t\xf2\xe6\x7fx\xf5;\x17:\xe4\x19\xcbc\xffY\xc6QY\"_(\xdby\x06\xd4\xa6\x81\xd3W\xfa\xec\x99z\"K\xf5\xb4\xfb\xf3f\xb9\xa8\x9c6E\x9d\x19\xc8v\xa2\xc4\xd7\ns\xafa\xa1\x80\xe5\x00\x00\x00\x00\x00\x00\x00\x00\x00\r', 0x0) ftruncate(r0, 0x1000000) r1 = memfd_create(&(0x7f0000000340)='@vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f\t\x00\x00\x00\x00\x80\x00\x00.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83\xcd\xaccy\x01\x93\xde\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3', 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) sendfile(r1, r0, 0x0, 0xeefffdef) 15:41:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 15:41:48 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15, 0x2}, &(0x7f0000000400)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) 15:41:49 executing program 4: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{0x3}}) 15:41:49 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x45884fadf31b16f8}) 15:41:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000080)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {0x0, 0x0, 0x100008000}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 15:41:49 executing program 2: pipe(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000}, 0x0, 0x20000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000780)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xdd\xa8\x86I.\xc3\x9aQ\xc8\x8e%U\xda\xbd\x10\xf9\xd7q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa8K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,g8\xddGdF(\xeaN\xbcSoz\xe5.c\xdf\x8b\xd2m}\xc7D\x98\xd4\xfd\xc8\x18@0,c9:\x95z\xe2\xa9\xcf\xd2\x90*\xaa\xc0W.\xcb|.F_E\xd4\r\xa9\xc8\v\x19Fj\x8c\b\xcb\xf7\xefw\x00\x00\x00\x00\x82/r\x0egC\xa1\x98\xa5\x9ad\x8fV\xad\f\xe1Px\xf6\x19aM\v\xbfY1\xab\\\x8e\xf1\xdfp\x89\x03\xa1w`\x87\x84\x991\x18\xbf\xd5\xc5G\aK\xf0\xfdF-\x9aF\x05\x05\xf6\x95\xb0F{\x10\x93\xba\x81\xbc\xee\xb4/X\x1fd\xde\x00\x7f|;\xb3\xe3\x04\x8c=\xc8;\xce\xec\xdfF\x03\f\xe2\xc6G\xfc\xa7\xd9\x0e\\\xb4\x9c\":\xa5\xc6Z\x12\xbe\x1f\xe1;H\x7f\x9dD\xe5\xd2LS\x81\x152\xdf\x81\x93Xlv\xc7\x0e\xa0u\x9f\xbdUv\xe0\xfb\xa0\x19\x91\xce\xd6\x1f\x93|u\x9f\xeaL\xc0\xd3f\xbab2\r\xec\xb3\x1c\xff\x8eQc\xd0Z\xcc\x94\xc9^xu\xfc\xb4\vX\x90\v\xf3yT&MSF\b`\v\xea\x10\xd7\xad\xc0\xdaty\xf1h|\xea\xd8\xbc\xf1\xe4\xadN\xc0\xbc\xe5 \\\x7f5oT\\\xac\xd6=q\x88q\xcc<7\x83\xaa\xf0\xb8e+\x13\xf1^I\xcb~~\x11`B\xdf\xf1xB/,\xd1\xe6\x17\xb2\x7f\xb6v\a\f1\xa8\xfe\xd6\xedG\x1b7\x01\x0fH%\x0fd\x8csRb\x03\xc9\x15jG`\x98\xef\x85\x12\xe3\x90\x96\x91\xf9\xbc\xdf\xd2s\xc9:\t\xad\xdbM\xb4\xa3\xc7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00O\x97\xd7\xc8\xc9,\xadB\xfb\xa1g\xef\x1d*\xa6\xf2\xb4\xd9\x9bYy\xa6_\xeb\xc1#F\xcd\x1fC\xe6\x9cL\xa4F\x17\x1b\n\xf9\xf3b\xcc>0\xc2\f\\>\x93o\xf6\x88\r\xd1\x8a\xc7\xb7qd=iZ\xbd\x15Rv\xdb|\x86\xbf\xce\x1b\x8f\xfew7QQv\xd5\xa0\xa1\x00\x00\x00\x00\x00\x00\x00e\xa2\x11\x8b(nNx(\xeb\x00\x00\x00\x00\x00\x00\x00\x00\xd0E\x1a\x91\x8a\\\xdb\xaf\xfd~\xacK\xd4\'B\x9f|\xa3.\xa9\xffy\xad|\xb7Te\xee\xa0\xd5\xfc\xce\xb0\xf0X?\t\x9e\xc9j\xad\xb5Z\x97\xa3\x9a\xe3\f\xd4e\x88\xdb;\xaeTY\xb8\xd3;\xb0\xf8\x02\x00\xa0k\xae@\x86@\x02\xa2\x88P\xe5\xf6\xaf\x82Z\x85\x9eQ\xa3\x1aFKbS\xba\xd4\x9a\x92\x82X\x1f\"\tOB,\r-\xfd\xe0\r\xf0\xecR\xb7\xe5f\x84\x12kIG4\x99\x9c\x00\x8f\xacY\t\xf2\xe6\x7fx\xf5;\x17:\xe4\x19\xcbc\xffY\xc6QY\"_(\xdby\x06\xd4\xa6\x81\xd3W\xfa\xec\x99z\"K\xf5\xb4\xfb\xf3f\xb9\xa8\x9c6E\x9d\x19\xc8v\xa2\xc4\xd7\ns\xafa\xa1\x80\xe5\x00\x00\x00\x00\x00\x00\x00\x00\x00\r', 0x0) ftruncate(r0, 0x1000000) r1 = memfd_create(&(0x7f0000000340)='@vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f\t\x00\x00\x00\x00\x80\x00\x00.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83\xcd\xaccy\x01\x93\xde\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3', 0x0) ftruncate(r1, 0x1000000) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x101202, 0x0) sendfile(r2, r1, 0x0, 0xeefffdef) sendfile(r1, r0, 0x0, 0xeefffdef) 15:41:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000002c0), 0x1c) 15:41:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r1, 0xa68defcc112353d3, 0x0, 0x0, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0xfffffffffffffe02}]}, 0x24}}, 0x0) 15:41:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000001080)={&(0x7f00000003c0)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000f80)=[@ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x89, 0x2}]}}}], 0x18}, 0x0) [ 2362.621224][T31060] loop3: detected capacity change from 0 to 264192 15:41:49 executing program 0: semctl$GETPID(0x0, 0x0, 0x13, 0x0) 15:41:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x4000000000dc) [ 2362.696461][T31060] EXT4-fs error (device loop3): ext4_quota_enable:6315: comm syz-executor.3: Bad quota inode # 3 [ 2362.731380][T31060] EXT4-fs warning (device loop3): ext4_enable_quotas:6355: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 2362.763838][T31060] EXT4-fs (loop3): mount failed 15:41:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736677c66200088020000400000004f80000200040000300e7fff0ff000001", 0x25}, {0x0, 0x0, 0x12000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='nfs=nostale_ro']) 15:41:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @private, 0x4e21, 0x0, 'rr\x00'}, 0x2c) 15:41:49 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x40000000007f, 0x0) r1 = dup2(r0, r0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x7, 0x4, "1a19788d4b122900f61e2f35556b43ab7a46f9dbba56a4028db295f0ebd12e0078776b2d39564f68ff25a75825fdf47014009663f15770548de6375179f9de25", "a8a1e97d5f35a57a4236a6dae2e385a87ddff1f4eb92986c11930a4f6277e32a28b5381ac62b91558d3fa321f91c58b1171f190c2d3d66c46b9a96c6341b744f", "74999cd311eafc174ed01b0fb1867c708fd72b9180212b552c1608b7d6177359", [0x1, 0x1]}) [ 2362.854821][T31060] loop3: detected capacity change from 0 to 264192 [ 2362.867045][T31089] loop5: detected capacity change from 0 to 288 [ 2362.911960][T31089] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2362.946027][T31060] EXT4-fs error (device loop3): ext4_quota_enable:6315: comm syz-executor.3: Bad quota inode # 3 [ 2362.981480][T31060] EXT4-fs warning (device loop3): ext4_enable_quotas:6355: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 2363.009526][T31060] EXT4-fs (loop3): mount failed 15:41:49 executing program 2: pipe(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000}, 0x0, 0x20000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000780)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xdd\xa8\x86I.\xc3\x9aQ\xc8\x8e%U\xda\xbd\x10\xf9\xd7q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa8K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,g8\xddGdF(\xeaN\xbcSoz\xe5.c\xdf\x8b\xd2m}\xc7D\x98\xd4\xfd\xc8\x18@0,c9:\x95z\xe2\xa9\xcf\xd2\x90*\xaa\xc0W.\xcb|.F_E\xd4\r\xa9\xc8\v\x19Fj\x8c\b\xcb\xf7\xefw\x00\x00\x00\x00\x82/r\x0egC\xa1\x98\xa5\x9ad\x8fV\xad\f\xe1Px\xf6\x19aM\v\xbfY1\xab\\\x8e\xf1\xdfp\x89\x03\xa1w`\x87\x84\x991\x18\xbf\xd5\xc5G\aK\xf0\xfdF-\x9aF\x05\x05\xf6\x95\xb0F{\x10\x93\xba\x81\xbc\xee\xb4/X\x1fd\xde\x00\x7f|;\xb3\xe3\x04\x8c=\xc8;\xce\xec\xdfF\x03\f\xe2\xc6G\xfc\xa7\xd9\x0e\\\xb4\x9c\":\xa5\xc6Z\x12\xbe\x1f\xe1;H\x7f\x9dD\xe5\xd2LS\x81\x152\xdf\x81\x93Xlv\xc7\x0e\xa0u\x9f\xbdUv\xe0\xfb\xa0\x19\x91\xce\xd6\x1f\x93|u\x9f\xeaL\xc0\xd3f\xbab2\r\xec\xb3\x1c\xff\x8eQc\xd0Z\xcc\x94\xc9^xu\xfc\xb4\vX\x90\v\xf3yT&MSF\b`\v\xea\x10\xd7\xad\xc0\xdaty\xf1h|\xea\xd8\xbc\xf1\xe4\xadN\xc0\xbc\xe5 \\\x7f5oT\\\xac\xd6=q\x88q\xcc<7\x83\xaa\xf0\xb8e+\x13\xf1^I\xcb~~\x11`B\xdf\xf1xB/,\xd1\xe6\x17\xb2\x7f\xb6v\a\f1\xa8\xfe\xd6\xedG\x1b7\x01\x0fH%\x0fd\x8csRb\x03\xc9\x15jG`\x98\xef\x85\x12\xe3\x90\x96\x91\xf9\xbc\xdf\xd2s\xc9:\t\xad\xdbM\xb4\xa3\xc7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00O\x97\xd7\xc8\xc9,\xadB\xfb\xa1g\xef\x1d*\xa6\xf2\xb4\xd9\x9bYy\xa6_\xeb\xc1#F\xcd\x1fC\xe6\x9cL\xa4F\x17\x1b\n\xf9\xf3b\xcc>0\xc2\f\\>\x93o\xf6\x88\r\xd1\x8a\xc7\xb7qd=iZ\xbd\x15Rv\xdb|\x86\xbf\xce\x1b\x8f\xfew7QQv\xd5\xa0\xa1\x00\x00\x00\x00\x00\x00\x00e\xa2\x11\x8b(nNx(\xeb\x00\x00\x00\x00\x00\x00\x00\x00\xd0E\x1a\x91\x8a\\\xdb\xaf\xfd~\xacK\xd4\'B\x9f|\xa3.\xa9\xffy\xad|\xb7Te\xee\xa0\xd5\xfc\xce\xb0\xf0X?\t\x9e\xc9j\xad\xb5Z\x97\xa3\x9a\xe3\f\xd4e\x88\xdb;\xaeTY\xb8\xd3;\xb0\xf8\x02\x00\xa0k\xae@\x86@\x02\xa2\x88P\xe5\xf6\xaf\x82Z\x85\x9eQ\xa3\x1aFKbS\xba\xd4\x9a\x92\x82X\x1f\"\tOB,\r-\xfd\xe0\r\xf0\xecR\xb7\xe5f\x84\x12kIG4\x99\x9c\x00\x8f\xacY\t\xf2\xe6\x7fx\xf5;\x17:\xe4\x19\xcbc\xffY\xc6QY\"_(\xdby\x06\xd4\xa6\x81\xd3W\xfa\xec\x99z\"K\xf5\xb4\xfb\xf3f\xb9\xa8\x9c6E\x9d\x19\xc8v\xa2\xc4\xd7\ns\xafa\xa1\x80\xe5\x00\x00\x00\x00\x00\x00\x00\x00\x00\r', 0x0) ftruncate(r0, 0x1000000) r1 = memfd_create(&(0x7f0000000340)='@vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f\t\x00\x00\x00\x00\x80\x00\x00.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83\xcd\xaccy\x01\x93\xde\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3', 0x0) ftruncate(r1, 0x1000000) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x101202, 0x0) sendfile(r2, r1, 0x0, 0xeefffdef) sendfile(r1, r0, 0x0, 0xeefffdef) 15:41:49 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000440)) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000004c0)={{0x77359400}, {0x0, r0+60000000}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 15:41:49 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x10) 15:41:49 executing program 5: migrate_pages(0x0, 0x3, &(0x7f0000003140)=0x6, &(0x7f0000003180)=0x6) 15:41:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000080)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {0x0, 0x0, 0x100008000}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 15:41:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x40000000007f, 0x0) r1 = dup2(r0, r0) ioctl$LOOP_SET_STATUS64(r1, 0x1261, 0x0) 15:41:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @private, 0x0, 0x0, 'rr\x00'}, 0x2c) 15:41:50 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) rename(&(0x7f0000000100)='./file0/file1\x00', &(0x7f0000000180)='./file1\x00') rmdir(&(0x7f00000003c0)='./file0\x00') setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000240)=ANY=[], 0x44, 0x0) [ 2363.515967][T31127] loop3: detected capacity change from 0 to 264192 15:41:50 executing program 4: sched_rr_get_interval(0x0, &(0x7f00000000c0)) 15:41:50 executing program 5: r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/user\x00') 15:41:50 executing program 1: unshare(0x6c060000) unshare(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@private0}, {0x4b, 0xbaea, 0x5, 0xc75, 0x0, 0x0, 0x5}}, {{@in=@remote}, 0xa, @in=@private, 0x0, 0x0, 0x2, 0x20}}, 0xe8) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f00000003c0)=0x2e, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) [ 2363.608955][T31127] EXT4-fs error (device loop3): ext4_quota_enable:6315: comm syz-executor.3: Bad quota inode # 3 [ 2363.650066][T31127] EXT4-fs warning (device loop3): ext4_enable_quotas:6355: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 15:41:50 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)='D', 0x1, 0x1, 0x0, 0x0) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x0) [ 2363.776423][T31127] EXT4-fs (loop3): mount failed 15:41:50 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)='D', 0x1, 0x1, 0x0, 0x0) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x0) 15:41:50 executing program 2: unshare(0x4000600) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, 0x0, 0x0) 15:41:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x300, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f00000000c0)=0x4, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) 15:41:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, r1, 0xb01, 0x0, 0x0, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x24}}, 0x0) 15:41:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000080)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {0x0, 0x0, 0x100008000}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 15:41:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x20}}, 0x0) 15:41:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind(r0, &(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x80) 15:41:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x42) [ 2364.192487][T31199] loop3: detected capacity change from 0 to 264192 15:41:50 executing program 5: r0 = socket(0x2, 0x3, 0x4) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x1) 15:41:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) [ 2364.272924][T31199] EXT4-fs error (device loop3): ext4_quota_enable:6315: comm syz-executor.3: Bad quota inode # 3 15:41:50 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000002080)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1b, 0x0}, 0x0) 15:41:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r1, 0xb01, 0x0, 0x0, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}}, 0x0) [ 2364.317823][T31199] EXT4-fs warning (device loop3): ext4_enable_quotas:6355: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 2364.371169][T31199] EXT4-fs (loop3): mount failed 15:41:51 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)='D', 0x1, 0x1, 0x0, 0x0) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x0) 15:41:51 executing program 5: unshare(0x4000600) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) 15:41:51 executing program 1: r0 = epoll_create(0x81) ioctl$int_in(r0, 0x5452, &(0x7f0000000640)=0xfffffffffffff5f6) 15:41:51 executing program 2: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, r0, 0x1}, 0x14}, 0x1, 0x8000000}, 0x0) 15:41:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvfrom(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 15:41:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000080)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {0x0, 0x0, 0x100008000}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 15:41:51 executing program 5: unshare(0x4000600) 15:41:51 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)='D', 0x1, 0x1, 0x0, 0x0) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x0) 15:41:51 executing program 1: unshare(0x4000600) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000540)) 15:41:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000002080)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, 0x0}, 0x0) 15:41:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @private0, 0x700}}) [ 2365.072105][T31284] loop3: detected capacity change from 0 to 264192 15:41:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000002080)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, 0x0}, 0xfc) [ 2365.133170][T31284] EXT4-fs error (device loop3): ext4_quota_enable:6315: comm syz-executor.3: Bad quota inode # 3 15:41:51 executing program 5: unshare(0x4000600) unshare(0x40400) [ 2365.175174][T31284] EXT4-fs warning (device loop3): ext4_enable_quotas:6355: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 15:41:51 executing program 1: wait4(0x0, 0x0, 0x21000002, 0x0) [ 2365.223873][T31284] EXT4-fs (loop3): mount failed 15:41:51 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/system', 0x0, 0x0) sendmsg$netlink(r0, 0x0, 0x0) 15:41:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r0, 0x9) 15:41:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f00000000c0)='z', 0x1) 15:41:51 executing program 3: pipe2(&(0x7f0000000440), 0x800) 15:41:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000040601020000000000000000fdff00000500010007"], 0x1c}}, 0x0) 15:41:51 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x88081, 0x0) 15:41:51 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/system', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) 15:41:51 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) 15:41:51 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/system', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) 15:41:51 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 15:41:51 executing program 4: fchmodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 15:41:52 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$eventfd(r0, 0x0, 0x0) 15:41:52 executing program 2: r0 = semget$private(0x0, 0x2, 0x0) semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f0000019000)=""/186) 15:41:52 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/system', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 15:41:52 executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) pipe(&(0x7f0000000040)={0xffffffffffffffff}) dup2(r0, r1) getsockname(r1, 0x0, &(0x7f0000000180)) 15:41:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) 15:41:52 executing program 3: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$9p(r0, 0x0, 0x0) 15:41:52 executing program 2: socketpair(0x0, 0xc01, 0x0, 0x0) 15:41:52 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) 15:41:52 executing program 4: mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x103) statx(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x0, 0x20, &(0x7f0000000500)) 15:41:52 executing program 3: semget(0x3, 0x4, 0x10) 15:41:52 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x105241, 0x28) 15:41:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 15:41:52 executing program 4: execveat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x0, 0x0, 0x0) 15:41:52 executing program 5: r0 = memfd_create(&(0x7f0000000180)='\x00', 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 15:41:52 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002980)='/sys/fs/cgroup', 0x0, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 15:41:52 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/power_supply', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 15:41:52 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getdents64(r0, 0x0, 0x0) 15:41:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) 15:41:52 executing program 3: memfd_create(&(0x7f0000000180)='\x00', 0x1) 15:41:52 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x20c4d6ef4e55c37a, r0, 0x0) 15:41:52 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0xa0881, 0x0) 15:41:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000007700)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) 15:41:52 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x140, 0x0) 15:41:52 executing program 1: r0 = semget$private(0x0, 0x1, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/34) 15:41:52 executing program 5: r0 = socket(0x11, 0x3, 0x0) unshare(0x4000600) accept4(r0, 0x0, 0x0, 0x0) 15:41:52 executing program 3: semget(0x2, 0x1, 0x0) 15:41:52 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/system', 0x0, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000001740), 0x2, 0x0) 15:41:52 executing program 2: semget$private(0x0, 0x5, 0x400) 15:41:52 executing program 4: r0 = semget$private(0x0, 0x2, 0x0) semctl$GETZCNT(r0, 0x0, 0xf, 0x0) 15:41:52 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x202000, 0xf) 15:41:52 executing program 5: semget$private(0x0, 0x5, 0x609) 15:41:52 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/cgroup', 0x0, 0x0) getdents(r0, 0x0, 0x0) 15:41:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1a8) 15:41:52 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 15:41:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup2(r0, r0) getsockname(r1, 0x0, &(0x7f0000000600)) 15:41:52 executing program 5: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmmsg$inet6(r0, &(0x7f0000001980), 0x0, 0x0) 15:41:52 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0xe334}], 0x1, &(0x7f00000000c0)={0x0, 0x989680}) 15:41:52 executing program 2: semget(0x3, 0x1, 0x400) 15:41:52 executing program 0: semget(0x2, 0x4, 0x91) 15:41:52 executing program 3: r0 = semget$private(0x0, 0x2, 0x0) semctl$GETNCNT(r0, 0x1, 0xe, &(0x7f0000000000)=""/69) 15:41:52 executing program 1: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 15:41:52 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/power_supply', 0x0, 0x2a) 15:41:52 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x105241, 0x0) 15:41:52 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/system', 0x2100, 0x44) 15:41:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f00000000c0)=""/208, &(0x7f00000001c0)=0xd0) 15:41:52 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) 15:41:52 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000002780), 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000001100)='net_cls.classid\x00', 0x2, 0x0) 15:41:52 executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r0, r1) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 15:41:52 executing program 2: semget(0x1, 0x2, 0x303) 15:41:52 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) 15:41:52 executing program 5: semget$private(0x0, 0x3, 0x81) 15:41:52 executing program 4: pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), 0x0) 15:41:52 executing program 1: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/130) 15:41:52 executing program 0: semget(0x0, 0x3, 0xdc) 15:41:52 executing program 2: semctl$IPC_INFO(0x0, 0x2, 0x3, &(0x7f0000000100)=""/104) 15:41:52 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 15:41:52 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x450882, 0x0) 15:41:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 15:41:53 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x40600, 0x0) 15:41:53 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x80001, 0x0) 15:41:53 executing program 2: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x250500, 0x0) 15:41:53 executing program 3: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RRENAMEAT(r0, 0x0, 0x0) 15:41:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 15:41:53 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/net\x00') dup2(r1, r0) 15:41:53 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x82300, 0x0) 15:41:53 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) 15:41:53 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001200)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003140)=[{{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000012c0)=""/126, 0x7e}], 0x1}}], 0x1, 0x2041, 0x0) 15:41:53 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(0xffffffffffffffff, r0, 0x0, 0x6) 15:41:53 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup2(r0, r0) write$cgroup_subtree(r1, 0x0, 0x0) 15:41:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8904, &(0x7f0000000000)={'netdevsim0\x00', @ifru_mtu}) 15:41:53 executing program 4: shmget$private(0x0, 0x2000, 0x78000000, &(0x7f0000ffc000/0x2000)=nil) 15:41:53 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/system', 0x0, 0x0) sendmsg$netlink(r0, 0x0, 0x0) 15:41:53 executing program 1: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$9p(r0, &(0x7f0000000000), 0x0) 15:41:53 executing program 3: r0 = semget$private(0x0, 0x2, 0x0) semctl$GETVAL(r0, 0x1, 0xc, &(0x7f0000000040)=""/4096) 15:41:53 executing program 5: ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000000)={0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72eddea9]}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/system', 0x0, 0x0) 15:41:53 executing program 0: semget$private(0x0, 0x3, 0x30a) 15:41:53 executing program 4: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000040)=""/129) 15:41:53 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r0, 0xffffffffffffffff, 0x0, 0x5) 15:41:53 executing program 1: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = dup2(r0, r0) dup2(r1, r1) 15:41:53 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/system', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 15:41:53 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semctl$GETPID(r0, 0x1, 0xb, &(0x7f0000000080)=""/238) 15:41:53 executing program 4: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 15:41:53 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$getown(r0, 0x9) 15:41:53 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/power_supply', 0xa0480, 0x107) 15:41:53 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) futimesat(r0, 0x0, 0x0) 15:41:53 executing program 3: semctl$IPC_INFO(0x0, 0x2, 0x3, &(0x7f0000000000)=""/4096) 15:41:53 executing program 5: r0 = epoll_create1(0x0) close(r0) 15:41:53 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) tee(0xffffffffffffffff, r0, 0x0, 0x0) 15:41:53 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x120}, 0x0) 15:41:53 executing program 2: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) 15:41:53 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/power_supply', 0x305000, 0x131) 15:41:53 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xa0081, 0x0) write$cgroup_devices(r0, 0x0, 0x0) 15:41:53 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xa0081, 0x0) 15:41:53 executing program 0: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) 15:41:53 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f00000000c0)) 15:41:53 executing program 1: semctl$IPC_INFO(0x0, 0x3, 0x3, &(0x7f0000000040)=""/221) 15:41:53 executing program 5: semctl$SEM_STAT_ANY(0x0, 0x2, 0x14, &(0x7f0000000100)=""/200) 15:41:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) 15:41:53 executing program 3: pipe(&(0x7f0000000240)={0xffffffffffffffff}) openat$cgroup_subtree(r0, &(0x7f00000001c0), 0x2, 0x0) 15:41:53 executing program 1: r0 = semget$private(0x0, 0x1, 0x0) semop(r0, &(0x7f0000000000)=[{0x1}], 0x1) 15:41:54 executing program 4: semget$private(0x0, 0x2, 0x18) 15:41:54 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x48001, 0x0) 15:41:54 executing program 5: semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000000)=""/44) 15:41:54 executing program 2: semget(0x1, 0x1, 0x100) 15:41:54 executing program 3: semget$private(0x0, 0x1, 0xb3) 15:41:54 executing program 1: r0 = semget(0x2, 0x0, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f0000000080)=""/166) 15:41:54 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x6}, {}], 0x2) 15:41:54 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_devices(r0, 0x0, 0x47) 15:41:54 executing program 5: shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ffd000/0x2000)=nil) 15:41:54 executing program 4: mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0x103) 15:41:54 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/cgroup', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) dup2(r1, r0) write$P9_RSTAT(r0, &(0x7f0000000000)=ANY=[], 0x40) 15:41:54 executing program 0: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RCLUNK(r0, 0x0, 0x0) 15:41:54 executing program 1: open$dir(&(0x7f0000000540)='./file0\x00', 0x40, 0x80) 15:41:54 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x131001, 0x0) 15:41:54 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/system', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0x0) 15:41:54 executing program 0: semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000040)=""/151) 15:41:54 executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = timerfd_create(0x0, 0x0) dup2(r1, r0) 15:41:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, 0x0, &(0x7f0000000100)) 15:41:55 executing program 2: r0 = semget$private(0x0, 0x3, 0x0) semctl$GETPID(r0, 0x2, 0xb, &(0x7f0000000040)=""/21) 15:41:55 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/system', 0x0, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, 0x0, 0x0) 15:41:55 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/power_supply', 0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, 0x0) 15:41:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000080)) 15:41:55 executing program 0: semget$private(0x0, 0x1, 0x40) 15:41:55 executing program 4: semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000080)=""/134) 15:41:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x11) close(r0) 15:41:55 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000019140), 0x20280, 0x0) 15:41:55 executing program 5: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r0, r1) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, 0x0, 0x0) 15:41:55 executing program 1: r0 = semget(0x3, 0x0, 0x0) semctl$GETPID(r0, 0x0, 0xb, 0x0) 15:41:55 executing program 2: semget$private(0x0, 0x7, 0x22) 15:41:55 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0x86000020) 15:41:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000004200)=[{{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000000c0)=""/101, 0x65}], 0x1}}], 0x1, 0x0, &(0x7f0000004340)={0x0, 0x989680}) 15:41:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) 15:41:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) 15:41:55 executing program 2: pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0) 15:41:55 executing program 5: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0x0) 15:41:55 executing program 0: semget(0x3, 0x4, 0x371) 15:41:55 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/cgroup', 0x0, 0x0) close(r0) 15:41:55 executing program 2: r0 = eventfd(0xfffffc00) read$eventfd(r0, &(0x7f0000000200), 0x8) 15:41:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) 15:41:55 executing program 1: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) 15:41:55 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/system', 0x0, 0x0) fcntl$getown(r0, 0x9) 15:41:55 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000007700), 0x0, 0xc0) 15:41:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f00000000c0)) 15:41:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 15:41:56 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000004100)=""/227) 15:41:56 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/cgroup', 0x0, 0x0) lseek(r0, 0x0, 0x3) 15:41:56 executing program 0: shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) 15:41:56 executing program 4: memfd_create(&(0x7f00000000c0)='@\\}+.)\x00\x12\xc8q\x05\xfa\x83{&\xd7\xfeK\xe06\xd2\x88\t\xaaj1\x01\x91`\x1d3\xab\xf9\xc6\x7f<\x04X\x9c\xf2R\xfb\x90s\xf6\x90\f\x0f\xcf\xf8IoK\x19\xeac\b\xd5 ?\xd4\xf4\xe6\x02=\xb7\xd4\xc6\x1cU\xbd\xb2\x1f\xb4X\x1d\x00'/167, 0x2) 15:41:56 executing program 4: semget$private(0x0, 0x3, 0x2) 15:41:56 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/system', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) 15:41:56 executing program 3: pipe2(&(0x7f0000000340), 0x80800) 15:41:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 15:41:56 executing program 0: r0 = semget(0x3, 0x0, 0x0) semctl$GETVAL(r0, 0x0, 0xc, 0x0) 15:41:56 executing program 4: semget(0x0, 0x3, 0x218) 15:41:56 executing program 2: semget$private(0x0, 0x2, 0x2c) 15:41:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, 0x0) 15:41:56 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/system', 0x0, 0x0) mknodat$null(r0, &(0x7f00000000c0)='.\x00', 0x0, 0x103) 15:41:56 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440), 0x102, 0x0) r1 = dup2(r0, r0) write$P9_RREAD(r1, 0x0, 0x100b) 15:41:56 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/cgroup', 0x40000, 0x40) 15:41:56 executing program 4: semctl$SEM_STAT(0x0, 0x3, 0x12, &(0x7f0000000080)=""/166) 15:41:56 executing program 2: socket$inet6(0xa, 0x3, 0x11) 15:41:56 executing program 1: semget$private(0x0, 0x2, 0x34) 15:41:56 executing program 3: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RFSYNC(r0, 0x0, 0x0) 15:41:56 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r2 = dup3(r1, r0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(r2, 0x0, 0x0) 15:41:56 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) fremovexattr(r0, &(0x7f0000000500)=@known='trusted.overlay.upper\x00') 15:41:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x36}}, 0x14) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000000), 0x2, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000001180)={[0xffffffffffffff80]}, 0x8, 0x1800) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000011c0)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xffffff2e) r5 = semget$private(0x0, 0x2, 0x170) shmctl$IPC_RMID(r5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRESOCT=r5, @ANYRES64=r4]) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, r4, 0x1, 0xc, 0x6, @random="00040600"}, 0x14) r6 = openat(0xffffffffffffff9c, &(0x7f00000013c0)='.\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r6, 0x5450, 0x0) 15:41:56 executing program 4: semget(0x2, 0x0, 0x20) 15:41:56 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/cgroup', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) dup2(r1, r0) 15:41:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 15:41:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f0000000140), 0x4) 15:41:56 executing program 1: getrusage(0x0, &(0x7f0000000140)) 15:41:56 executing program 3: get_mempolicy(0x0, &(0x7f0000000040), 0x101, &(0x7f0000ffc000/0x4000)=nil, 0x4) 15:41:56 executing program 4: msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 15:41:56 executing program 2: timer_create(0x0, &(0x7f0000000380)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000003c0)) 15:41:56 executing program 3: mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 15:41:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x0, 0x0, "f602d98083132c0c3884a5cfea30adbf1afa472a441343e5c7796c6c12a8b368d41257af8cbe6a98157125746921103f8fcc1101ca7c8540ba39e839e4d17cf04b346e69b3baa724deec8c9ba4a4f81e"}, 0xd8) 15:41:57 executing program 0: shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000001c0)=""/47) 15:41:57 executing program 4: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/206) 15:41:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 15:41:57 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000100)={{0x1, 0xee00, 0xee00, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000080)) 15:41:57 executing program 3: shmget(0x0, 0x4000, 0x2, &(0x7f0000ffb000/0x4000)=nil) 15:41:57 executing program 3: syz_open_procfs(0x0, &(0x7f0000000340)='status\x00') 15:41:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000000)=@nfc, &(0x7f0000000080)=0x80) 15:41:57 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000200)) 15:41:57 executing program 5: timer_create(0x0, &(0x7f00000001c0)={0x0, 0x5, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) 15:41:57 executing program 2: epoll_create(0x5) 15:41:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x2000000, 0x10000, 0xc26}, 0x1c) 15:41:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000002640)) 15:41:57 executing program 0: socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/uts\x00') 15:41:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x4a, 0x0, "f602d98083132c0c3884a5cfea30adbf1afa472a441343e5c7796c6c12a8b368d41257af8cbe6a98157125746921103f8fcc1101ca7c8540ba39e839e4d17cf04b346e69b3baa724deec8c9ba4a4f81e"}, 0xd8) 15:41:57 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000240)=""/181) 15:41:57 executing program 5: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) 15:41:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000340), 0x4) 15:41:57 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000380)={&(0x7f0000000180)={0xa, 0x4e21, 0x0, @remote}, 0x1c, &(0x7f0000000340)=[{&(0x7f00000001c0)="91", 0x1}], 0x1}, 0x0) 15:41:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, 0x0, 0x0) 15:41:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x80}}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_mtu(r1, 0x0, 0x4, 0x0, 0x0) 15:41:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000001240)=0x7, 0x4) 15:41:57 executing program 1: mq_open(&(0x7f0000000340)='-\x00', 0x42, 0x0, 0x0) 15:41:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffff9c, &(0x7f00000002c0), 0x4180, 0x0) 15:41:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote}, 0x14) 15:41:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000002c0)={0x0, 0xfe, '\x00', [@enc_lim, @hao={0xc9, 0x10, @mcast2}, @ra, @jumbo, @calipso={0x7, 0x58, {0x0, 0x14, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0x776, "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"}]}, 0x800) 15:41:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x4, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) 15:41:58 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, 0x0) 15:41:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@dev, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in6=@private1}}, 0xe4) 15:41:58 executing program 5: timer_create(0x7, 0x0, &(0x7f0000000c00)) clock_gettime(0x0, &(0x7f0000000d00)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000d40)={{0x0, 0x989680}, {0x0, r0+10000000}}, 0x0) 15:41:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) 15:41:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$binfmt_elf64(r0, 0x0, 0x0) 15:41:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x80}}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_mtu(r1, 0x0, 0x4, 0x0, 0x0) 15:41:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2c, &(0x7f0000000000), 0x0) 15:41:58 executing program 1: r0 = openat$full(0xffffff9c, &(0x7f0000002640), 0x0, 0x0) mq_notify(r0, 0x0) 15:41:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000070603000000000000000000000000000500010006"], 0x1c}}, 0x0) 15:41:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 15:41:58 executing program 5: mq_open(&(0x7f0000000080)='\n\x0f\xe7\x94\xef\xc0\xed\x87|\xe6\xb5\xd5\xb7\xae#\aQ\xbf\xc1\x83\xf1L\x1c\xad\xde#\xd1\xcf\x96~\xe4o\x18\xdc\xc2\x9aKs}\xb2\x03Fdw\x80\xf0c\b\x8b \x00\x00\xe5\xa0Jj\x97\xbcR\x88r\x9c\xe8*\x1b\b\x8au\xcf\xfe\xeci\x02E\"\x8e\x96m\x8c\x94E\xbc&\xcc\xe4\xe8A\xa6\xb7Wf\x0eN-\x97\xe4\xc1\xfey\x9c\x96X\x01\x87\x7fP\x86\x87\x0e\x82yq\x9fQ\x02\x13\xd7\xfa\xe4\xb2\xcaI\x14\xee$\xc6y\xfd\xc1\x1b\xe0`\x89(\'\x7f\x92\x16i\xf8\x10+\x15\xfd\xbd\xe1\'\x0f', 0x40, 0x0, &(0x7f0000000040)={0x8, 0x0, 0x9, 0x6}) 15:41:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007a00)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000079c0)=[{&(0x7f00000004c0)={0xb0, 0x0, 0x0, 0x0, 0x0, "", [@generic="bca01bf6f3f7227791aa6443c540c5e4197fff7901cf892fbd73c34e867097b19602451dbd9bdd4f85d5c330c5941f621f4b9cadb52b1f041dc16648ed77ef52efb36b4540e38c920f43589d5d5cbeac55247e52d36aa896872887961282ad640128aa3548cb3d56a9160b26d4694fb6d0ae3952c95bd343b28d602c9771a3d71d7dee116f4a6e8cc4f16e5762c9c59f1491124a47", @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@local}]}, 0xb0}, {&(0x7f0000009780)={0xe14, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x279, 0x0, 0x0, 0x1, [@generic="8949fc07fac04afde3a41bf9ef43617e3bc755ba7f4625f1b7af69036adf6ed96f6cf448d13b74bc9725378f83", @generic="688393bfca1817873901fc795890fb542c7d0828068ec75959f5ed96d9677a6f7b560f277832991452e501f40cabbb349eafe005c9053235e6d4298be80ddd02c793713b097a84745391fb2ca509b524b662ff6218d2c6632102171d4bb7d97310d96926f74fa39f5600372f8aa6f49f24368ef1e879a212995fda56477ec48f436f262111563e96", @generic="67976646f9f87781cb970386996af77086bfc0fd2a6c75075520627d60178e8ebf6cc2552d93bbc94023161f13111dcaceb4fb390535485cd833d4b874a3b8b4e178a0978d85613729e8b23f9bc3582644d5a2504bcd9a23fa1c0ef94590c862d38c2eba8179ec262c00003eb852d74746cc158d55c40bc3472397c9dcf7155e683e632bf90a731488769f5c368088a17bbd1b1c45c243901d74dbb9e43143658ce421f4", @generic="2091e9ec7816ce3839843ea29757104d71a74aa2ed64af99a9ce62303679f06dc4fe1d45d0e6086ece33be4566c2c58dbb5fbb8c0909d4e61fa86228875253fb7a6c90b089efd652a920c27c4955235b7424e220999f927539144b1fa07d0fc5be869993c1828f7d1938f4f3e82670507329", @generic="f3d92d6537d5cc903706373ef0e9e5b01a774458aea58e71bebf0c69b660c43bcddf53bde94a663536dc436926bd06b4de5d1d59e919ca2bd47235e709ad16b64702d5d8daf8bdf2ea595eeb5168c7e1d9dbcfa355ec190a5e539d1447e76b4142a43708305c7fb518fa218a094f1d18b22d041a116daeb40c675622eddc7f7b1b2e9b562d61c36b6a4a18b5bcd0d01e02f38fcdf78d04100e299f70cbe1281164f0b37fb23f6ba0a450"]}, @nested={0xb9, 0x0, 0x0, 0x1, [@generic="f6c4ed5069191734144886aa958979c4ade8b6456bc8bff7e877ae558b9caafac3c70f92a0a420331c28", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x6, 0x0, 0x0, 0x0, @str='(\x00'}, @typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="54fe99d000afe1399939d80f1ece0252e7e9419ee405666f2665ee5c346274f6e4da996d0a243b94cb1dbf0f54d85912f9698f1f900c589f1076541babd7c2db50a8c716cbfbf2c9be5ac0af427c95a678956a8de2188560be775720e2c1ee6f9fca144481b5dc08db39e35bb5fdc372f68484"]}, @nested={0x225, 0x0, 0x0, 0x1, [@generic="78605919b46944b9f0e0ce3446454f7ea4eeb4fe8cb9c3d31587f7fdd003f61e31b1a14f45f44b3abb81053e6ff7902828fcd81e707de44868f00a99bcabe992c8bff1a737023697dc9aa1126906", @generic="e7c49e9a29087a81b8bb44875ebc380c985f5b89b57a52795f2a6a8146e1bf261298f8001dc2fea19dce299a0f0c7d4c4085f48fd85b2171906fa41ab8a3a9729b7c4aa2d0f51fc677101e9d14e5fa5bfc5aa5f850f4bb18fc6173f542bc823f144762cf32518afa90eafefec9e41ac06adc33983223f7e807b8f3b7292e6b0de4b493b68a442fb7e2d614a3947765d369926c471c6b54289bca769d54050a4dc33f374c727a2fcd87198ba4da7296c4625308d792818921a43d0d4cf1d3d32ec6118878c6c1c694d50a61f64b8938835285149c0e0838410a50e439642c3a6a21c90c1b17e2db4cb2db9e8478", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="6e902a215aeded882cce05ba18be119c932f8252d417669d3f01ad2a4b600cee241c77ad4f0aa292a65dbf2239be418a319bbb0fd7ff14a39ac00e0183f850153b99d6e748c87ce9e792e1b335f81e73e84a026f0bcd117a78709077d8cd06d5e05637e88be8752faaf7c890495bc4bee73f0fb6133413ebc025938972af04f3342cbf120365b6378e29e08f64043ce8e7231e5bd12b982556cff7a3017d951990902b18bec13377b7b6a019a760fd4dea7914d37713587cb4d5f364d47f767d33323ce08ac0468a347552356d465c90edea4d2ea16b", @typed={0x8, 0x0, 0x0, 0x0, @fd}]}, @nested={0x8a1, 0x0, 0x0, 0x1, [@generic="dba5de0188cdc8735de4a9ec874aec05b60b590fa5935f2cf1cc5545f6dc3e9bda44a77441e9ccfa6d735cfbf3f1aeb212dcc855ce32220aafc0eba8893891df1d9d9c63826586f3265809fa3ef6766c3f486d71775b87a628be0bb8c87e0cf251fa2e1aee1e4ecc8e9a63fdba34befde4335b6b39d9b8d135799fb69c92af5136c10f2f89580a550c81cf08269913f534f903a31d01637f2cae2d61e4808eb514089ecf208fd0e2397603422a7c82f760d96c5009b2438cf42eeaf93079efaf4da9aeef4629a445fe7398d91025d12209f3f5b9870e6374ef3c0a105ea9426a551da3e52ea674bf4be345b50bc4638bff69d29e9d0097e4d25d689d985977c4f194e374bf945ec2b90d22ff442a4f762803cedadaa63e4657a64d99f7210798ee48d318004dcb616388a9f0e709464596ef328f39df84f503e7f514b638790d6f4ae860b429bcd885013a4bd2f4bad7c1ddc4affb7b66a4b625faa7c867918679bd94adf66beb5f02492f9b276d98c595fa6cc99739c01ec1ae60db0dd8d1d2e3de8e58c5dfd109c5f1919c180f88f10db9012376eb283da6977c5ff32498ddd94eba6e7f519a96a224973519d737b7e37f158384b3465b27682de5193f1f176ec5add6e375fa60f7485686c4a61643b458f6712f7e7616c02e401ff39ccaac959fb8580c8fe5f5f6795eaf4e6bf5333d294c6af7b61e3a8012781ac06dbaae1537ed2423b29da6ec0a9e72ee7d92dcf12bfe053ecbb076a4955ad4dbe2afc83fb652ee380deccf5bbd901263ef8cd5c3741e61d95754f6b638c5390d2db9327245d8349a64ee0e48198950bb7833eebf32682e7982978f3e0340272b518d957d9fde4d7cc3efc3895f1182f1b46d4891d3cc3a415697dc2c578f2678660873093d6fadb363342d921da954ccbc8ae4aeab345c8be8e980cab1991bd4a9efa58faa1c8389fddf4e95b091ba566991d72547bf31ca06f7c355addc60b326c988b1129a04a1d280d5f58a65e71ad73d034aca31e6af9c472fd997fff21873f84d05c48780ca3ad382988f3667b90691fea59842d55a700f12a424db422fdc21093cdcf96cfac79957b08455a39743641a888188f7d7673e91d4d704cfecde2de086a01b452fe310aee93c6f6afaad05b8bc3570d9fc9b82dc0b66cdeebba659e1f3675a4c074d16a0dafbeed0fe70b8b89c44e476353248c16cb0b722aa333d2482a3a727c2d844519d600384527bc7b6994b7ab8f3bb094769d6f909a3f94d5c9065ebcd870db7fa65d647762fbeac9e633ccca98d375837158732608c45caf92f970ce98647c06e8205fc6c108e81b182535917ffefa1957390575922e8f00b94baf4b69db566f90d844904cd4cec5f831edc323d62f14283556673c0ebaa21e2d822f6c680a50d216b331702a064060606e8fd6cf2777a1914ef298b51e36a4c6007c226f507b2363b59f51967940589515f7d204022c0bfde696ee3b65ad3e035576c6cd1c735da2b5dc8760222e1387d124ac3a5fad1dc2a5c6207c4599a58748d7d69e191785669151b5ab1da970b3fd15103258897b35216ae3db81fcdf089690828d2d834cb0b23a59f3c102f5081a8e5f2724ee9e7f735de670144076cec39b2c6e08a6504fae85df92fcf10d0afc6c424dc036d322a1054a3e8f01fe43c71660d7c46a0509ed8eed8bf348a2c97c5866b1ed6ff72c22c28be9d24ff5161a0d6dbeeb32af58512490e8f3082de60f4360c349293509caac16bd6c0f59df3cc8f95718f84602ca933304bd059cc1635addfaf0170bebb8708c1f146f3b0228a72fb4b400d2baacf46931c2909b10c92d1c81db85c5f129b0d1be3f0461724550150a115174b25c6844620baa49d111c0608b301a1ccd91e753b6e5027a6bffddc85972892611392156998c3ff339b4ae7ee79f3359c31ab45f87bba167304accb199c7d381b08f6adf1a2d3a74f7980416f6763ad0bd0da0f84cc1c96cf6bc7d8c8032138265662308b6cba003cddc5354e48bc95cbd2e8a4035311c2772afbce123a7cde6820fb0ec55ca18d64c9b2a699553db25108c0832216e4b72dd3bf885fb070746075477ea48654bd4acb1a9491e5361d00ee8eb6435becc1e8c92e7c44c32ff7699813d980177524326a9d59c7eea8a50c928c3679fa45fff1d900bcf59f1e8475bb27979743a3c9470a3a8a619ce1b39d8203f12e8427bdc4a6c22f872f16c5e1a916685a07437364f356926342e3986db1988670f0419d7dc008e287aec1220c00f02016a074562e8ebd69cefd1141a6503d1d674d030f5f3a5d70ddf52b2a71f626c5ac8c804467d382cd0c3c5c3c178577d9644c75b3dda7e5ed12379d3ed869985012a6ae5413e1b68a7dc2d5fd6383b969f4e5071375c95a2f17e0c112ffe1ee4355deea1c02497cfef39ad130317ecf38c7e52a9116cdd1db78718a09bd74ae60bf32453439d6b9b2fbae9a576b9554ae80e98dc1a9847ee0741b4a3a17e94c88e5126bbc70ae8e52584831612279ecb6c271365961a3d1aad60d8ef943e58165f5ad847197b6606bdbcc9e9146a1e4e635bb42f42ae7e0157915c7d638b0cc11815e06061eb9ddcf6419c267628b6a813e1afde1673083eb04f3c743c517e5c8d1404a0eb4b36ee792891f80dd9308b2125c942579b900b8b50e0a3cec7597d03a9057b51cf20c258e95528b3c0d0342a99cd29768bcd5d26e2154a762dd09bdfa1ef013c5f9aeeea114d86a17f7ded4be62cd551411be3b22a6553610f5992302b7e43aaebfb149a80b165e44aa26e6be10f45e20ae14959a70d3ec38272bc1db9a8d790a970e4143dc1e96d99783322ddcc915a000ae82b51ce7c1adcec5e01a3ae9c99e6fbacd2830b1160c008d50dbf6d5e3e76b7ca18cd52699821d87b21363fe9a2213496a0013c0df010468a37bd965b245563fbf1c4b40fe068e20886c89798dc0447b72fbaf33c8c5c766106d6d1feed04c35229293112bff7565ea99b33f304b048a4ad9ad98d3d6524d5ec2163f3be8b46f6387b10d943b052a9ff5b625db2fb343625596c1a8bff067c554624e1b5cde229355a55b333452755d4aec10368bbe4f381551bac159fa6479ae"]}]}, 0xe14}], 0x2}, 0x0) 15:41:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) 15:41:58 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[], 0xc4}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={0x0}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x3fb}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 15:41:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000080)) 15:41:58 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_ACTIVATE(r0, 0x5607, 0x5) 15:41:58 executing program 4: creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) [ 2372.355287][T32027] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32027 comm=syz-executor.3 [ 2372.368138][T32027] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32027 comm=syz-executor.3 15:41:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x80}}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_mtu(r1, 0x0, 0x4, 0x0, 0x0) 15:41:59 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000007c0)="66530700ae897094e7b126b097eaa769be36b2fb7be6a16d05c41bd34e677d99590e0c390439df0000000000000087cfec79b04c3e1fea4b7a3dfc8ea6a7efefcf8d731508a0b4ff15f715e05182ce7d2b1830262f4adaf1e8eab06db4ec53303739b6d1438b4b6a8fdbfbf026387e78777e2f392a956c5c84a1cb34401e0b937fd387b5417a936a634cc044a48bb1e566b916f9", 0x94}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 15:41:59 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x2, 0x0, [0x0, 0x0]}) 15:41:59 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f742e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffffc654"}, 0x80) sendmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="a18bb05204c6acb6825fdf86c953", 0xe}], 0x1}, 0x0) 15:41:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:41:59 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f7c6126795da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868b7e7018e80ad3b35caee7719390b42c05fc989", 0x7d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:41:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) 15:41:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:41:59 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f7c6126795da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868b7e7018e80ad3b35caee7719390b42c05fc9899122c5b2b6b60f7e8849c8fad68909f11b5e502375ed449638d5c3e73024dd19f8f325b0456a01f65442e64d91", 0xaa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2373.174662][ T22] audit: type=1326 audit(1633448519.662:85872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32049 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f350361c8d9 code=0x7ffc0000 15:41:59 executing program 1: mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x1) chdir(0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0xfffffffd, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', 0x0, 0x40000, 0x1, &(0x7f0000000200)=[{0x0}], 0x40, &(0x7f0000000480)=ANY=[]) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95162, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x81, 0x0, 0x100, 0x5, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 15:41:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f7c6126795da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868b7e7018e80ad3b35caee7719390b42c05fc9899122c5b2b6b60f7e8849c8fad68909f11b5e502375ed449638d5c3e73024dd19f8f325b0456a01f65442e64d9148a3a491b0", 0xaf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:41:59 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f7c6126795da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868b7e7018e80ad3b35caee7719390b42c05fc9899122c5b2b6b60f7e8849c8fad68909f11b5e502375ed449638d5c3e73024dd19f8f325b0456a01f65442e64d", 0xa9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2373.277369][ T22] audit: type=1326 audit(1633448519.692:85873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32066 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 [ 2373.325339][ T22] audit: type=1326 audit(1633448519.692:85874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32049 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f350361c8d9 code=0x7ffc0000 [ 2373.358505][ T22] audit: type=1326 audit(1633448519.692:85875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32066 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 [ 2373.388436][ T22] audit: type=1326 audit(1633448519.692:85876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32049 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f350361c8d9 code=0x7ffc0000 [ 2373.413841][ T22] audit: type=1326 audit(1633448519.692:85877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32049 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f350361c8d9 code=0x7ffc0000 [ 2373.439160][ T22] audit: type=1326 audit(1633448519.692:85878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32049 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f350361c8d9 code=0x7ffc0000 [ 2373.464461][ T22] audit: type=1326 audit(1633448519.692:85879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32049 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f350361c8d9 code=0x7ffc0000 [ 2373.489755][ T22] audit: type=1326 audit(1633448519.692:85880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32069 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f350361c8d9 code=0x7ffc0000 [ 2373.515736][ T22] audit: type=1326 audit(1633448519.692:85881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32066 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 15:42:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x80}}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_mtu(r1, 0x0, 0x4, 0x0, 0x0) 15:42:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f7c6126795da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868b7e7018e80ad3b35caee7719390b42c05fc9899122c5b2b6b60f7e8849", 0x87}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f7c6126795da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868b7e7018e80ad3b35caee7719390b42c05fc9899122c5b2b6b60f7e8849c8fad68909f11b5e502375ed449638d5c3e73024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:02 executing program 3: modify_ldt$write2(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, &(0x7f0000000100)={0x277}, 0x10) 15:42:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) eventfd2(0x0, 0x0) 15:42:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) clone(0x10000000, 0x0, 0x0, 0x0, &(0x7f00000002c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x1c, r1, 0x711, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 15:42:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) readlink(0x0, 0x0, 0x0) 15:42:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:02 executing program 2: r0 = socket(0x18, 0x2, 0x0) setsockopt(r0, 0x29, 0x9, &(0x7f0000000080)='\x00\x00\x00\x00', 0x4) 15:42:02 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/system', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) 15:42:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f7c6126795da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868b7e7018e80ad3b35caee7719390b42c05fc9899122c5b2b6b60f7e8849c8fad68909f11b5e502375ed449638d5c3e73024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:02 executing program 3: unshare(0x4000600) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 15:42:02 executing program 0: io_setup(0x1, &(0x7f0000000000)=0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000080)=[{}], &(0x7f0000000100)={0x0, 0x3938700}) 15:42:02 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000800), 0x0, 0x241) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000840)={0x0, {}, 0x0, {}, 0x0, 0x12, 0x0, 0x0, "923a92801d27141035bbec0ab5da6f263666860d4c6ddcf6b7aab779d415f00b628347b117d8822e2b9d8cef623c7c7d10ad1b755914c9f1de7984b1be87a188", "8fa103d8b6b377add84e7d27ad54616dbbfeb4fe088239ebac95b2e8e9e2a7f2"}) 15:42:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000005300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000008a80)=@file={0x1, './file0\x00'}, 0x6e) 15:42:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:02 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:42:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) exit_group(0x0) 15:42:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) exit_group(0x0) 15:42:03 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:42:03 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:42:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) exit_group(0x0) 15:42:03 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43408) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 15:42:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:03 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:03 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) exit_group(0x0) 15:42:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:03 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) exit_group(0x0) 15:42:04 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4a425d4584382dba8e92c7c9f94d85d363008", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) exit_group(0x0) 15:42:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:06 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:06 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) exit_group(0x0) 15:42:06 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2380.366243][ T22] kauditd_printk_skb: 529 callbacks suppressed [ 2380.366255][ T22] audit: type=1326 audit(1633448526.853:86411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32334 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 15:42:06 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) exit_group(0x0) 15:42:06 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2380.497014][ T22] audit: type=1326 audit(1633448526.883:86412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32334 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 15:42:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) exit_group(0x0) 15:42:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2380.627996][ T22] audit: type=1326 audit(1633448526.883:86413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32334 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 [ 2380.678204][ T22] audit: type=1326 audit(1633448526.883:86414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32334 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 [ 2380.703837][ T22] audit: type=1326 audit(1633448526.883:86415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32334 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 [ 2380.730123][ T22] audit: type=1326 audit(1633448526.883:86416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32334 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 [ 2380.756144][ T22] audit: type=1326 audit(1633448526.903:86417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32345 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 [ 2380.781713][ T22] audit: type=1326 audit(1633448526.903:86418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32345 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 [ 2380.806731][ T22] audit: type=1326 audit(1633448526.903:86419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32345 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 [ 2380.831729][ T22] audit: type=1326 audit(1633448526.903:86420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32345 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cb57328d9 code=0x7ffc0000 15:42:09 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:09 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:10 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:10 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:12 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:12 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:13 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:13 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4a425d4584382dba8e92c7c9f94d85d363008", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:13 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:13 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2388.240310][T32490] cgroup: Unknown subsys name 'perf_event' [ 2388.246489][T32490] cgroup: Unknown subsys name 'net_cls' [ 2388.467365][T32566] cgroup: Unknown subsys name 'perf_event' [ 2388.473366][T32566] cgroup: Unknown subsys name 'net_cls' 15:42:15 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:16 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:16 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2389.815673][ T22] kauditd_printk_skb: 168 callbacks suppressed [ 2389.815685][ T22] audit: type=1326 audit(1633448536.304:86589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=900 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2389.865176][ T22] audit: type=1326 audit(1633448536.304:86590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=900 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2389.890089][ T22] audit: type=1326 audit(1633448536.304:86591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=900 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2389.914992][ T22] audit: type=1326 audit(1633448536.304:86592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=900 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2389.939737][ T22] audit: type=1326 audit(1633448536.304:86593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=900 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2389.964684][ T22] audit: type=1326 audit(1633448536.304:86594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=900 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2389.989342][ T22] audit: type=1326 audit(1633448536.324:86595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=904 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2390.014117][ T22] audit: type=1326 audit(1633448536.324:86596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=904 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:42:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:16 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:16 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2390.050346][ T22] audit: type=1326 audit(1633448536.324:86597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=904 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2390.075259][ T22] audit: type=1326 audit(1633448536.324:86598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=904 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=200 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:42:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:16 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:16 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:19 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:19 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:19 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:19 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:19 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:19 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:19 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:19 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, 0x0, 0x0, 0x5) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:22 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:22 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:22 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, 0x0, 0x0, 0x5) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:22 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2395.557664][ T22] kauditd_printk_skb: 240 callbacks suppressed [ 2395.557676][ T22] audit: type=1326 audit(1633448542.045:86839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1085 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:42:22 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, 0x0, 0x0, 0x5) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x1d) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2395.677492][ T22] audit: type=1326 audit(1633448542.085:86840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1085 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:42:22 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2395.746801][ T22] audit: type=1326 audit(1633448542.085:86841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1085 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2395.772159][ T22] audit: type=1326 audit(1633448542.085:86842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1085 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2395.798487][ T22] audit: type=1326 audit(1633448542.095:86843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1104 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:42:22 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2395.825433][ T22] audit: type=1326 audit(1633448542.095:86844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1104 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2395.881896][ T22] audit: type=1326 audit(1633448542.095:86845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1104 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2395.912980][ T22] audit: type=1326 audit(1633448542.095:86846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1104 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2395.938102][ T22] audit: type=1326 audit(1633448542.095:86847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1104 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2395.964172][ T22] audit: type=1326 audit(1633448542.095:86848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1104 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:42:25 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:25 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:25 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x1d) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:25 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:25 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x1d) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:25 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4a425d4584382dba8e92c7c9f94d85d363008", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:25 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:25 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:28 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:28 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:28 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:42:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:28 executing program 0: r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:28 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2401.648302][ T22] kauditd_printk_skb: 130 callbacks suppressed [ 2401.648316][ T22] audit: type=1326 audit(1633448548.146:86979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1192 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 15:42:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:28 executing program 0: r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2401.766796][ T22] audit: type=1326 audit(1633448548.176:86980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1192 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 15:42:28 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2401.839325][ T22] audit: type=1326 audit(1633448548.176:86981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1192 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2401.882710][ T22] audit: type=1326 audit(1633448548.176:86982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1192 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2401.920308][ T22] audit: type=1326 audit(1633448548.176:86983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1192 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2401.951883][ T22] audit: type=1326 audit(1633448548.176:86984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1192 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2401.977561][ T22] audit: type=1326 audit(1633448548.176:86985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1192 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2402.003098][ T22] audit: type=1326 audit(1633448548.176:86986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1192 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2402.027930][ T22] audit: type=1326 audit(1633448548.176:86987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1192 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2402.052863][ T22] audit: type=1326 audit(1633448548.176:86988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1192 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=200 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 15:42:31 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:31 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:42:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:31 executing program 0: r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4a425d4584382dba8e92c7c9f94d85d363008", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:31 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:31 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4a425d4584382dba8e92c7c9f94d85d363008", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:31 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:31 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:31 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:31 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:34 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:34 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:34 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:42:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:42:34 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:42:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:34 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:34 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:42:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:37 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:37 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:37 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:37 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x0, 0x0}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:40 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x0, 0x0}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x0, 0x0}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:40 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:43 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:43 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:43 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2417.237936][ T22] kauditd_printk_skb: 21 callbacks suppressed [ 2417.237954][ T22] audit: type=1326 audit(1633448563.738:87010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1504 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x0 15:42:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2417.335557][ T22] audit: type=1326 audit(1633448563.808:87011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1510 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x0 15:42:46 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:46 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:46 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024", 0x96}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2420.193202][ T22] audit: type=1326 audit(1633448566.688:87012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1525 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x0 15:42:46 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024", 0x96}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2420.257423][ T22] audit: type=1326 audit(1633448566.748:87013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1527 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x0 15:42:46 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024", 0x96}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2420.332741][ T22] audit: type=1326 audit(1633448566.828:87014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1553 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x0 15:42:46 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f48", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2420.526035][ T22] audit: type=1326 audit(1633448567.028:87015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1566 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2420.571066][ T22] audit: type=1326 audit(1633448567.028:87016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1566 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2420.596131][ T22] audit: type=1326 audit(1633448567.048:87017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1566 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2420.628264][ T22] audit: type=1326 audit(1633448567.058:87018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1566 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2420.679628][ T22] audit: type=1326 audit(1633448567.058:87019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1566 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:42:49 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:49 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f48", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2423.210138][ T22] kauditd_printk_skb: 5 callbacks suppressed [ 2423.210152][ T22] audit: type=1326 audit(1633448569.708:87025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1578 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x0 15:42:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:49 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f48", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:49 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2423.254011][ T22] audit: type=1326 audit(1633448569.708:87026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2423.279789][ T22] audit: type=1326 audit(1633448569.708:87027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:42:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d58ff65d85055e212a5b60674d802c69fff4d6e1cafcf08a157a92436ac0ac0ea18581f5ec1faf45daeef24112751b2cb2287f82951fe0fae9a414c0555d729f913680e3167e462bc9478bcb", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:49 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:49 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x107}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:49 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 2423.431934][ T22] audit: type=1326 audit(1633448569.708:87028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:42:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2423.522345][ T22] audit: type=1326 audit(1633448569.708:87029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2423.590517][ T22] audit: type=1326 audit(1633448569.708:87030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2423.653835][ T22] audit: type=1326 audit(1633448569.708:87031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2423.704268][ T22] audit: type=1326 audit(1633448569.708:87032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1588 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:42:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x107}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:42:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:50 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 2423.733959][ T22] audit: type=1326 audit(1633448569.708:87033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1588 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2423.765373][ T22] audit: type=1326 audit(1633448569.888:87034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1601 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:42:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0c0f833198026", 0x6e}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x107}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000020052508f"], 0xe8}}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:51 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:51 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x123}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:51 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4a425d4584382dba8e9", 0x123}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:51 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x123}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:51 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x128}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:54 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:54 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x128}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:54 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x128}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:54 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:54 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4a425d4584382dba8e92c7c9f94d85d36", 0x12a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:57 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:42:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:57 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:42:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:57 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2430.746076][ T22] kauditd_printk_skb: 488 callbacks suppressed [ 2430.746106][ T22] audit: type=1326 audit(1633448577.249:87523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1843 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 15:42:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:42:57 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2430.882511][ T22] audit: type=1326 audit(1633448577.279:87524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1843 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2430.946817][ T22] audit: type=1326 audit(1633448577.279:87525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1843 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 15:42:57 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4a425d4584382dba8e92c7c9f94d85d3630", 0x12b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2431.035785][ T22] audit: type=1326 audit(1633448577.279:87526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1843 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2431.071221][ T22] audit: type=1326 audit(1633448577.279:87527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1843 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 15:42:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) [ 2431.726080][ T22] audit: type=1326 audit(1633448577.279:87528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1843 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2431.754952][ T22] audit: type=1326 audit(1633448577.289:87529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1855 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2431.781202][ T22] audit: type=1326 audit(1633448577.289:87530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1855 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2431.807413][ T22] audit: type=1326 audit(1633448577.289:87531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1855 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2431.833689][ T22] audit: type=1326 audit(1633448577.289:87532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1855 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2433.362710][ T1883] cgroup: Unknown subsys name 'perf_event' [ 2433.368902][ T1883] cgroup: Unknown subsys name 'net_cls' 15:43:00 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:43:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:43:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9c", 0x37}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:43:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:00 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:43:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9c", 0x37}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9c", 0x37}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:43:01 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:01 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:43:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e054", 0x53}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:01 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2435.158647][ T2424] ================================================================== [ 2435.166785][ T2424] BUG: KCSAN: data-race in __mark_inode_dirty / inode_cgwb_move_to_attached [ 2435.175486][ T2424] [ 2435.177906][ T2424] write to 0xffff888105f8a230 of 8 bytes by task 15655 on cpu 1: [ 2435.185704][ T2424] inode_cgwb_move_to_attached+0x79/0x1f0 [ 2435.191438][ T2424] writeback_sb_inodes+0xb4d/0xd30 [ 2435.196549][ T2424] wb_writeback+0x27d/0x6d0 [ 2435.201057][ T2424] wb_do_writeback+0x101/0x530 [ 2435.205900][ T2424] wb_workfn+0xc8/0x540 [ 2435.210049][ T2424] process_one_work+0x402/0x910 [ 2435.214897][ T2424] worker_thread+0x636/0xae0 [ 2435.219565][ T2424] kthread+0x262/0x280 [ 2435.223628][ T2424] ret_from_fork+0x1f/0x30 [ 2435.228039][ T2424] [ 2435.230364][ T2424] read to 0xffff888105f8a230 of 8 bytes by task 2424 on cpu 0: [ 2435.237894][ T2424] __mark_inode_dirty+0xda/0x6a0 [ 2435.242885][ T2424] ext4_mb_new_blocks+0x16fc/0x1fc0 [ 2435.248078][ T2424] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 2435.253366][ T2424] ext4_map_blocks+0x71e/0xf00 [ 2435.258124][ T2424] ext4_alloc_file_blocks+0x281/0x730 [ 2435.263494][ T2424] ext4_fallocate+0x2a7/0x4d0 [ 2435.268169][ T2424] vfs_fallocate+0x459/0x6a0 [ 2435.272757][ T2424] do_vfs_ioctl+0x13c6/0x14c0 [ 2435.277429][ T2424] __se_sys_ioctl+0x83/0x140 [ 2435.282007][ T2424] __x64_sys_ioctl+0x3f/0x50 [ 2435.286591][ T2424] do_syscall_64+0x44/0xa0 [ 2435.291004][ T2424] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2435.296901][ T2424] [ 2435.299224][ T2424] value changed: 0x0000000000020080 -> 0x0000000000000000 [ 2435.306315][ T2424] [ 2435.308633][ T2424] Reported by Kernel Concurrency Sanitizer on: [ 2435.314774][ T2424] CPU: 0 PID: 2424 Comm: syz-executor.2 Not tainted 5.15.0-rc4-syzkaller #0 [ 2435.323448][ T2424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2435.333604][ T2424] ================================================================== 15:43:03 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:43:03 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) 15:43:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e054", 0x53}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:03 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:43:03 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e054", 0x53}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2436.923855][ T22] kauditd_printk_skb: 272 callbacks suppressed [ 2436.923867][ T22] audit: type=1326 audit(1633448583.420:87805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2439 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:43:03 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x12000005f) [ 2436.994724][ T22] audit: type=1326 audit(1633448583.430:87806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2439 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:43:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:03 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4a425d4584382dba8e92c7c9f94d85d363008", 0x12c}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2437.084181][ T22] audit: type=1326 audit(1633448583.430:87807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2439 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2437.109743][ T22] audit: type=1326 audit(1633448583.430:87808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2439 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:43:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, 0x0, 0x0) [ 2437.158005][ T22] audit: type=1326 audit(1633448583.430:87809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2439 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2437.208446][ T22] audit: type=1326 audit(1633448583.430:87810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2439 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2437.233604][ T22] audit: type=1326 audit(1633448583.460:87811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2447 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2437.268019][ T22] audit: type=1326 audit(1633448583.460:87812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2447 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2437.292721][ T22] audit: type=1326 audit(1633448583.460:87813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2447 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 [ 2437.317930][ T22] audit: type=1326 audit(1633448583.460:87814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2447 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7f6c85fc58d9 code=0x7ffc0000 15:43:06 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:43:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, 0x0, 0x0) 15:43:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:43:06 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d5", 0xe2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:06 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7", 0x61}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:06 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d5", 0xe2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, 0x0, 0x0) 15:43:06 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7", 0x61}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:06 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="625307009f513fcfae8970374cc61130ffe6c6a0d494b126b097eaa769be6d651bd34e677d114b654b499374a8db38c1d611ec7d370002c44f7b934a647d9ce42408669959fba3476259df9530d8a03dfc8ea6a7efefe48dd9e05485b4e2b872d94461aeef5b530ae7dcac21034e1bf0c0f833198026cfd7d29b23ab006214cd55bbc261784250b40b65f4ee6b48030000001a17a2aa53def91415d2eb32864595a4011a668190b4b13f1701ccd46a7293fbebd7a3cec8b617293f6715fe7dfe62ee6e153db2ce289d5f5c7b1df7cac2bb7cb75fc86f4acf1c63d59ce6d09dfca7d5", 0xe2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x1f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='rdma.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:43:09 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:09 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:43:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140), 0x12000005f) 15:43:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7", 0x61}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:09 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2443.048320][ T22] kauditd_printk_skb: 186 callbacks suppressed [ 2443.048332][ T22] audit: type=1326 audit(1633448589.551:88001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2523 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 15:43:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x108}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1d) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0", 0x68}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:43:09 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be114b654b499374a8db38f8c400fcffffffffffff45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485da78e925054caa2fcb1f6dde756da92e054b5f6c7a3877432f583868c9e7018e80ad3b35caee7719390b42c05fc9080000ede611747f2c514ec8fad68909f11b5e502375ed449638d5c3e7ac0dbd1a5ad7f8b84a68583024dd19f8f325b0456a01f65442e64d9148a3a491b09f02eb19ac6aebb49b4f105563f426a41f099f3580c823acc7f708d644940c69f8c6a408f0d7af2146f518e20000f5971ecc83b46c7f486e634cbdb8ff664124bbb89a4aaa47bc50f64b9ffc37e3371058a6eca41b7732e9f5a243ed7c0300842fa7bfbc7904536acdd186f5d3a7fff4a425d4584382dba8e92c7c9f94d85d363008", 0x12c}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2443.112705][ T22] audit: type=1326 audit(1633448589.591:88002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2523 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 15:43:09 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2443.199570][ T22] audit: type=1326 audit(1633448589.591:88003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2523 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 15:43:09 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1, 0x0, 0xb}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2443.252320][ T22] audit: type=1326 audit(1633448589.591:88004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2523 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2443.306224][ T22] audit: type=1326 audit(1633448589.591:88005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2523 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 15:43:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="625307009f5157cfae8970374cc611307fe6c6a0d494e7b126b097eaa769be6d05651bd34e677d114b654b499374a8db38f8c44f7b7d9ce42303669959fba3270b332e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4e2b884d94461aeef5b530ae7dcac21034e1bf0", 0x68}], 0x4, 0xd) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 2443.343170][ T22] audit: type=1326 audit(1633448589.591:88006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2523 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2443.379099][ T22] audit: type=1326 audit(1633448589.591:88007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2523 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2443.459880][ T22] audit: type=1326 audit(1633448589.591:88008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2539 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2443.485700][ T22] audit: type=1326 audit(1633448589.591:88009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2539 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2443.510855][ T22] audit: type=1326 audit(1633448589.591:88010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2539 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50a3b1f8d9 code=0x7ffc0000 [ 2444.883690][ T2567] cgroup: Unknown subsys name 'perf_event' [ 2444.889967][ T2567] cgroup: Unknown subsys name 'net_cls'