2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) 03:37:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1a) write$cgroup_pid(r0, &(0x7f0000000100)=r1, 0x12) 03:37:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0xf, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x7f, 0x80, 0xe8, 0x6}]}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x40, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, 0x0, 0x0) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r1, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) readv(r3, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x8}], 0x1) r4 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000050000000000000000000000ffffffff010000001900000000000000000076657461315f746f5f0400000000000065727370626e300000000000000000006272696466655f736c6176655f31000069653e841901e50ac9000000000000000180c2000000000000000000aaaabfaaaa000000000000000000d4000000d40000001c010000636c757374e57200000000000000002000000000000000000000000000000000000000000000008e8300000000000000000000007265616c6d0000000000000000000000000000000000000000008000000000000c0000000000000000000000000000006c6f67000000000000000000000000000000000000000000000000000000000024000000004608fdc2eedaf8ff6fcbc6a67ee31e6bfa4cf9f0761ffdac96c7d300bc1d000000000000000000000000000000080000000000000000000000000000000000000000000000000001000000feffffff00000000"]}, 0x224) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000500)=0x400) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f0000000240)={0x4, "a4e4708b54a998964e8eca39cd530398dd2cf38edb0cd490a1116b17f46b94ec", 0x1, 0x1000, 0x5, 0x1210108, 0x800, 0x4}) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000300)={r6, 0x3}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000140)={r6, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xee80d5a4ff4e6e5f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x5ffe, 0xffffffffffffffce, 0x0, 0x0, 0x0) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000440)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff3000/0xd000)=nil, 0x1000}) r7 = socket$unix(0x1, 0x5, 0x0) r8 = accept$ax25(0xffffffffffffffff, &(0x7f00000005c0)={{0x3, @rose}, [@netrom, @remote, @bcast, @remote, @netrom, @bcast, @rose, @rose]}, &(0x7f0000000640)=0x48) ioctl$sock_TIOCINQ(r8, 0x541b, &(0x7f0000000680)) readv(r7, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/222, 0xde}], 0x1) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80, 0x0) waitid$P_PIDFD(0x3, r9, 0x0, 0x1000000, 0x0) 03:37:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) poll(&(0x7f0000000000)=[{r0, 0x100}], 0x1, 0x6) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) read$FUSE(r1, &(0x7f0000000500), 0x1000) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) sendmmsg$nfc_llcp(r1, &(0x7f00000049c0)=[{&(0x7f0000000080)={0x27, 0x0, 0x1, 0x7, 0x0, 0x18, "bb2d06237249ae760041ace522a31d6518cbc6a394d0282142717779c05b4639da93f499f17c01e1b79415b74422d35bb3ef010d4e94e2b7cf6fa389c9da46", 0x37}, 0x60, &(0x7f0000001640)=[{&(0x7f0000000140)="8ac792212a1c31e835a44c7f486ac000b5ef9450efe389014739d2b707e16bc706346c51255472076e343160b81f95c192da801447a5c9610f22d2a4d3aab4a3bb439d909e1362a4af81af64745ed515d6775d62e1c7cdca54a239c0c8bd12a4889d07ba6f0cb624c8dc3802a637008ce1b2a7d63d1074799c3179244b", 0x7d}, {&(0x7f00000001c0)="e12fe8fa96bead7d56df0ca805fdaf12e12c212aeb8363de2e607a667614d00f57c38a9e844e44171db065b52e01d72b6798de8fe93d26586467", 0x3a}, {&(0x7f0000000200)="8e173e9a4b1e0c6961b5e025d01e72a213d64dbeb6d343d4987526afa96621a3ee4ab5d50a1cf7b35301fa7fb6e8ca7885587de4788315a422a92d8dba2005539bac4ec2af0f080bec5d7ab6cae2f389414fb59b6d", 0x55}, {&(0x7f0000000280)="c4ff56f5be9c998ec995be5e6aa951db0c81357ad40378f192cca33fd9dcd60c9c1e2d7f7497f3dde5c7c3739648cf40565ace8175deb9b69014d05dc8723cd8e8e371802ee3277089d9899c2a", 0x4d}, {&(0x7f0000000300)="97ea33cda831232378fe59c18842b4618e03bacbfe895ce799bff0ffa50933ed7e516f5c70e00002f9166fccc2e6900123039dedbebe704d918888d23c6d93451ae7b19485b45c329ee0", 0x4a}, {&(0x7f0000000380)="7f6e03e9c88fe54fbdf6640f0a8ab87f180009d02d3785cee2e61c8163b0c3a2e945ba49c267cd537ed83b70809870b53b4ef0a347fc41f0c0794ebbe2b838a70638ed1b418c2695723481b4912ea0d4375dea29be256d58f418202afe2659f7c1ca35120fcfc36441e23536267259b8d3d6fe146893271ddfdf0b0542551aa5a384e4cfa573b17cb6ba0d074a11c613358fc50ea96dc2622c6662806e909eb9fbd60522cfc05f19e00557e40e9f97efe99d590ad01816ccae2b92308a8f78317a6338d499326d9f6039058e40048e", 0xcf}, {&(0x7f0000001500)="08d49671eefc5e417b7c5a51ca80b950d9b6e060922e14b3abb69cd2b3695385a463c7b21e9c2232ce22a75fff309f4e5b13e53c53cd467c1a44436867488aef7ab90e906c1d51642d659ceb3c5f5555117e49c969fef32e002cbc44e0ab9c7f0368c61847d9fc83", 0x68}, {&(0x7f0000001580)="61c591df27d15482755cbc56368e1ecb397bc2468a8731325f3c8c4aa03659e0f8c67f63209a1181238d50eb49a63769997277042b2cebf3359fe2d7e4f50b83e4282cfba76f743a173d8d3e83cd55bb1760369c56d8e6ca24299a462e3f66852e8a4a29dab16f3b3727e2687f020fce303fadc206c3629c858b410d6a47a799a90c", 0x82}], 0x8, 0x0, 0x0, 0x4000}, {&(0x7f00000016c0)={0x27, 0x1, 0x1, 0x3, 0x56, 0x4, "4240cee81350faa7338561d670e8ca44c087f99a25a62b6d87d447e102c493bca8ab43897485eae64546b2e584f169f5199d05f0a9fdeb7e7d74d98ef67a38", 0x13}, 0x60, &(0x7f00000019c0)=[{&(0x7f0000001740)="a63949fff527169c8806c73c9ea20705b4d6054a49145f73559e32252542b80517fb101888d56ee80c08fb3049734fc118affa82afaf40e39877df806cf1c74806f2703608ca0ae82d3b5bbdbf74ef52c0891ebb125476a3f499637aec4bb6707b07fd078c3eaf0df4bf666f89721972f1ba9bcfc8e2d0942602c1a714037095a98f1bfa88aa003628280178f819d33160eacc2342a06d19f362df2c214bc9ed88e3b5927142377d0a8d9da66825152cbb90bd2a255916e3f89414f9caf4ae94c47812ec52bd96d3df87e3ea561c76f4e57bb7753faf525f1ee884c3ff363e9feb148f2d56c34638247404d7be", 0xed}, {&(0x7f0000001840)="b35245bef6f8351d2b33ca1105bf14ef62d5ed37f5b5583d201c4a966bfab4c37fd44efcaaacc4e84ff1594ce0016ab92451f938196cbcbe72863e80803827f558e4418d32cd19d74f5493eaaa0381e02d36015eaf154b2c1ff7cd3591eb3b90b205e59e3635864ec8d8d8dbc0273b089a9a85a191fcd7d8", 0x78}, {&(0x7f00000018c0)="8a4b40ce2ccd385e3496ab09e989b605f0f7bba579ae7d053b0521c2c95aa566e24225859423f97b65a1c01399a8a02d2da4e40c08d142c1b0194e2452421f5d879c9585e12a1622385fc6fe4ede402af47e4ef03a5655d7eb6a8bde446d42bdeeab3a30e5bba7e092ee618cc7128c4aeaadb8b9fb7f268821", 0x79}, {&(0x7f0000001940)="fc6b740bbb24599704759e7acc227eb32f3246f85a4777c8947f246a978ac82bb5fc9638b0152dc22ad5e8c52a5f38f62625336d453e9f801599efbc19416a33bd83759785b967d5", 0x48}], 0x4, 0x0, 0x0, 0x4}, {&(0x7f0000001a00)={0x27, 0x1, 0x1, 0x7, 0x5, 0x81, "b03a5b9c6ae7bd66891109f3d8e1cafb04dbc64dd10f559015767ec72cefdfa0e4cfb6f06f2d779bab9ecc0445e527de51e70a059416f284e74e63467cbd28", 0x4}, 0x60, &(0x7f0000001bc0)=[{&(0x7f0000001a80)="d4096e8b8694308330aba841d5045deca19337cc92effed3058ff218eca69a4ad2530601e8281eaf770fd4f20d44b0b36698c1e1f4f1249fce3b1f04472eead1f21ccfd975d7a2683cee97b4ef1405430381ea19e54b4acbc22a013b5f4ba12c06ee4620e82b30eb0f59fcbdbdd0ed60805ca483243c4e90f0a0ab244a108f03a4c4c186a2e8d417e7f50bd5ae091ec361b49365915165fcc894ca52a6073897bcf807c1c72b546b503bfa3c744dbec9e8e73e322b1f9acba4b8699652910a573e7d17da305d5ba6efb4da8b0408fcf40cbeb6", 0xd3}, {&(0x7f0000001b80)="f8af878a362100aedcf577e9815141d8d8fe3b72afe2b3b51c", 0x19}], 0x2, &(0x7f0000001c00)={0xf0, 0x113, 0x5, "e46a856f9152e527a9f32907aec9377324520f6fb6be0f9a20916c3367b8b7fa7119ade01e13dd9bd167189190d0dd685b9e6631e68ba080d439475db55b81f85da81334a76f0b12705ef92c29c091057aaaad112cf777b0f3d3f13d4328508840551d41a9270f8abc5ca7fc6419e77d445bbdd23ec28bcf71370a6390b20da8dafee7c46cae7097fad8fb27b91bcfe5186707ff3b3ed5a97d2d827ac37973bc1e62f8f3cb7b1bb0128c197222e4119036c6b2c25df153fc7d5f41f777e9046b2d836ca70541b07bbd5795b72594cf6e662c8b42208400a7edc3f687"}, 0xf0, 0xc040}, {&(0x7f0000001d00)={0x27, 0x0, 0x2, 0x6, 0x6, 0x2, "efcf1f42a4ddbc04d7bac94097cda463634b341f308adc2078aa96f1651b9547f9b48ac64f012e235ee540cd7a714be74881400adff64904feebd086a8b28a", 0x3}, 0x60, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)={0xd8, 0x3a, 0x5, "ec46b4cf81e5366503378703746defd1915d45b209e33d5edc1cab5b7a02f40c006aeaf607a591c98cb89a56b9db9f87ffb61eaf9b2a0570518becfd9af5f53bd42c4751d9f1580dae1f54cfebb6b21027ac32673bf74d6635965ed7e5354de54df08168dec84c3874e4a88f2d07d1e5c128fd70cc2862e6349ffaa525a8c63ff3b977bc8fe6e446874ad6980e6eb0e9bc8809dd35afef27f265a1ac6ffacde30defc1cf30f08e640e6247ccc1b509bb90e7458789c76b3088f8f4156bb9a839b69435e714"}, 0xd8, 0x10}, {&(0x7f0000001ec0)={0x27, 0x1, 0x2, 0x3, 0x5, 0x81, "4a4923bb3022be941275dbf2e56f50111e0ee38b96d3026f5121b37e1695bd64210c784fe3e93f5524853ff5d18594a4ba6b2d25e943ab0b25d01dc0d92f43", 0x1}, 0x60, &(0x7f00000031c0)=[{&(0x7f0000001f40)="9246119dc6fff80b145c97e4a8c953560a3617e0b08519275b87fab67eda587dd06909018210911314073a517dc974116206d722923d5b3bff1dca29a9ad54a6a1541ba9acef0c20df147ac0c010c1dc7b99fae10d9a225f4177ab575ac076f8cdbc8ec3b4cd515b87e26d081e81fca9b1cb9f3a7e7f14ce530b5e19d3a1842d21448ae26ea43f44abb974e81353ed8dca77e6eedf8eac3bff8816a0e31f77089943fcc067677ce4283af1257f9587c264b90bb1351ab14d5e8acda54160327482e8e3830a64b8170a772d29eb7d73966631bfbae9ef260dde02ce3ab1", 0xdd}, {&(0x7f0000002040)="dc7dbead6361c78457ac6e14741b759d30d6e636a12aecb320b8ec3845da2e84b65d8d54a18f1c856c", 0x29}, {&(0x7f0000002080)="5ee8d51ac863ccb950502d60c604f382c7382bec45f6ff51fa0d3331972073406b4e5b3eb4356c40888685ff02e698989630d2574ec1e3f3ceedb85d2f0b1d35139fb4fa376ae1d34402a9e7bf671430de6facece1ebeb85cd0a3518547d4cd89fac9a6750db6aad1784b9080d980a193b86bdf3f61700369855644a1b38584e9b3b804c795ab96f8afed14615917b9de6842016f0b1ac86e885b454013e7cd017a0af5eecdfca4796ff76eb9412f67a2e5cca37b18cab7052e189ab1b4297bc6611902302e6f746cbd7266d20c507146e73063a0196bab8afff5ae0b518b9627099d3b67eae222fa28cac1b9b7c6c924dfbeca2d490c48eb5b56fbb380b63b33623fecacc1def9ca7ebd93f409dada9d0705eb10caed21ccb6e5e10ec5dd8f5f1195adf6a5b8bbdb51b1aab807b0ab2958fd49a3485bb01e543f1b324ec2a43a3bc01ef1827f026280bd8033d8b73bd052f7d47404907a7d33c0ebd43564cbcfa32c6b723f8cc9b0be731909f4e34cbb2f82a6ad159dcedbea997cd0f48e987e2af9720facd3a9273f4916367e66201fcf0e221a19503665e971eb15b8f513baea8619bafea93b9210ae5f6ccad96d7908d987c1a7ba27f15e75bfdcd011a14fc2b057b0251c62aef67afdcb77a5c6b5eea3eb2688cc965eb0b1bd12794ae1b685c01d1b2e7859a475b3b5a69ccb89d82e8a16cf97b6e89971f70d4558da2ec28d5be515cdf42f9a86603cd4605b0a514699780b3afa1f9015f02e3b76ec699264306c4e2cc68bc0cf27c3d13ba9889b46543365d2909ee1e7d9f7158ef8f7ecd0b2d04711bbb5d2cd1f7116b11256f1dd240b74da67b91b64491448e28c7d1a5db4a46ab0d0358f8009cd4c237d913f4251e0cad234ac6a93f18c8b1128f9f190e36dea03e9a647343a99ab3a7e180b7b506e5e1dec1087f2b52c06f851c76a1b1ea1a8b82684868077fdd186fc030ab5a9543879a7061c356223a73188535832af5e9578529b903cef06996d71b569aba1ffb9302875e8054b1cb1510c9f7a7df37b70c22fc5363bc523063a232959f8972f1835e6e6d20fcaf3c99e59ccf3d31478e4bc4c305890d0a05e74b08d048f30c70dd085095da31121e10ddc216b7a58c9967aaf66cd027cd23a9bf83350d2d7e085b9d8518bc67d23255cd1c0823871cc2e47f58ac7bca993beec582dd7abaae019535a971129b8d2f1dcfc45b931c9c0cd53d42237c8f84d2e13cd19741048c57f47d2acec6561188319a2ccb2d4f05896738e000e2c3ea9944bbc5252feda96b635c3f7fa765f6cd87ddeb853cb8a51e0dd205e914582f8f4ce24222a61ef82b63932a3c8477c5c234642cba627212b93c54367b48f4e7c288a7e3382dae95c6423372e7639b9bffb27f5ffe0531da1ac9cd94fb5312b718b27711c5e88900d84c10885beb826eadc0b4dee03e012422db17178f7805f27be92fbd2d5dd6ad6209ed43d8ede50bd807026005fc4e6e0ec1a33340fc8a0ec9996c492101f557f5263010e178ecf9f4b858daec910eff31f0e038cc73f7c13bfe0d6a9ff1c4f4163d5309f0cbeb9feec890b1aab2380b0ae1d72e51d81669d335cd74d8c42b9c4fbc763643827f733b40a8d6f8db48c86f245d3a36c043942542ca24e130708562b27127ff7d81354389d33992315cf11a861fb96b519f7662dfac4d09587d70f3c48963bb2ea69cbeb814b3e8fdf065a43866eb223c204c88f90d7820df817ebfdc861adfba60bd98d41847fd47648c3604dc98e62a0c364fa7940016b30b17bcf88ad61427a5d3279eceedb376d2a38c5bb559f1636a5f871d80e4893bd344acbc4c78dbe59b4066946f65415853bf05e832a746a6dd4ea1b02258fbbf1b4a02114902b494ad5523d96264f00038ad64172284749ecb1c5c96eaed7a7504ff838f5e4e58c823345a219bdda8d1395240da015892fed6f1873ad161fa9dbea8e813316c0982ea3579b1f7e42b7d51c504fab2e3076b4fa21cfbc4dde3265a51240ca975f69d9275e9f25fd247694d326ae10b1da2ca17bd23080bb0b44ddf5d874f2f90cc07dece9331a308e125f48a453007ace04ab2787efb89acf5ec8a4759226334b2794ea97e2226d8a570e40be6f8bd87fca2a5fa0153993d77eaf0cfef93445c404b21dabd2d92193dcf592a258efd74eb6c57351f09e0f093d26ffe071f85f1dd68282d94ec493a47fc4d8c8000f2c7c0cfcc5dc80e78a893efee1902385b1a0be242dc01210f205d2d9a3514d0a64555c64cc6079beb274c7a0011fa759f7e70f60c79dd1174ca2c7b9a26db9aa7edc65ebb9e1e8adec93a7f7f9c5c2d1dd9457809aef98a9bd65d480ccd6a8c4671689390b4cee5fa18e521d546ec350b945bf364435b75d5b06ef1268b41054476e9ee5fcd74f75dffc40c5d6370beeafce88e690585b4bab662ec58ea3f5e7e8068e270b10361a57ccd0cc24446bb664a2f60bdeeb926d182883eb4f96bb65c99f5f50d73ec4847070916f547bd5720bc047ed7e983d48d2c6ed3dc0b550e4cb0addfc283b96a7b9b71ba3f4cefaef2b8a2910915ed34bdc8ed843713376d0ba72efeb5b027a1656a1ac97b0c69071bd182218d6532e15575eff87b241eded0414517199183952126d46945562e9ea6ba6cfb997364d5889f9d1f1e8c6cafce90e1da5694965df5fe06ffc046e2271282d3629e21338df020218d3e84848fd5647f22c6ab5f1ce2969678930fdfb48efa0516e8b48d304aeb181dce3a5d0fba7f322710c1da4563502572f0a91b9f539d3f0c22b9ee0fd405d1fd5e9d3d71177dfabe80f1405716b454219441fd70cb87035217e962fb45d1fa1ed2c63ff99f6eb67f03dae97d03b4a9e28fd906152c5336876af6664c1b8e7056486028c875c2861b3bfbf18e85417a4e31645b859f19b78bad56b45d725cc06645847cf65bd303540a871077e0b2b477cb91359aa2be207ca733d34d7a0adaffd46105268e1874281b8eb8cc1ecc60e0c76bb7633a118d66f2d6bf16af5ff52d946ae52b139227c330b97c45c61c720d1e25acf1a1acf90a07ea81e0983dfa538c4147d5efd3529fbf672fab36831010a741bcdfa9e146c2ffc8cc6f3d40c430aea7df86f9e4c051ddf04f79579766192ec8b0fd8d2a753fa0edd24e108fccc098cc44c28c1afbfaab4044cdd90e855099bacb5b4a5cf5046d797bdb2e73fd60efffcd44e2341a9407e5cf5d132bf2d065befc4a8dfb621ac35e4fbf2e72a6cf6ed1de4b8b16419555deedc34bdf9acebab91e13c55d51f021c1b0ac44e72ed23970c2d90507fc273db1b75ad93f6983ab8b40e3418b33c143c3aee2fa68f169713748923397b32df0947c1a558321d04691b925e293964b119e6346f98da03deb1d7a0413e8f04feaab413ab2201a35798319d7e4b52430d91eed390db3a1a9205593b899d0aaaeba2e8be64ab206765ff54862a771f4df05f2488521257b8b34c61f8d21eef85f54835eee9511aa0987dc46864166df59c442c6d819f5b684a69b787f8e6e04cbd4364bc84d168e8d067bf357455f7d9a1cdfce35edfb9cc4d41e4aa1bfca7fbcb0cd965e72c4ec906fceb35c3ee74b0348941619482c48c10ac3cdb6c9c02273dc9da3b30f53e59779897032e8ca22644f43eec2c91cddf96cf82a3590bf1cd2e16219c6609809c31437e18d61095a1311a0acfd2bd45e3b49ea85df51f70a379b2c41b297a34b8043774c74e56a1f1e2456e097a9c6da69306f5a2fe869afd247032ce98873dbd2a146a2191dcb739ea59e09b49773875fb9f67a75abe70a2eb8ea96cdecc22b6c3a56ef3576b94d52e28e7c06f125b1dad7641cd77b1b9a106ebebe6652810543f7ec295a9eaf54eb3613990d4d8b3f3e736c08591868290f1241878cf58b02d4aa538c1a2b87780cb65516e30648691bce4e51e22a97ff3c014b8a04b8fd0b430591fef382068c7f847c3cd39f36f49b384f55ac40ff3928f4980e6db0af467789bbc05ae03f00c261afecb442dc147e63bd4cfd4de4c5cea59411c7d14e6d77b43753759286c48a4b5d3d473a5ef9f8c2e27bc3c27b9d61f9e0fdc0281ea4c3fa463413dab412cd95ebeb6f253d73b95121c2d88a270074fc12192c77449494234f821f8c3959d194f7af71d1b6461542641fa82119f2b14f5df8e3f300f632eafad9bb00dfa84df267cc9036dd2c9ca482e823cd2ae63de75ea9d28a12f5f86c918afe6b1267acaed204b8f4f3bff16171f13d428ffe3f96784e4c2e67c0b9c28d44ec0e3d99032e007b95409634232a3d0c25ead636333b413b61950cbec91017b1f8541f76052f4ad1ab2a34893f0a241f1fe17b66e002e26bd2e5493f7b787ed596122058fe6bba7127636733ed12023a4ec8e40bd4f9ad7739cad1691afa5614915dca7fe1ad74c9fec26d124296fed9134012427457e1bbb00b26ef69c7753eb9aa0d7fe6f60ffa46ed71dfaf86c7fcfed3fc28ee6b399efbc30ad4ec43c254aba3ad8c50b8ebd4e348553e018c4d8413dfa90b3b33adbe100ada795a4c23f280b27c2d0451fc5a24b7523c401c70d92bb30a16447934196433815e6f14f1f7ce8dec480b94c7f65398647b2667c7c072681ae4aeb0dbbb8c2bd0c56037048a0e08b62da4dda02ce5bfb5c77aaf3c02efd3196c51edc4cd67586c036f7a197382df372918c1b7482c8747e7962e2dee2c14ee2fe5c3edb1242d3078802c337fbece36669df49cf0b85e2488b3e880d8edfe3c306b40f34766b3663cde409f1c66d641f1c12910907e8234ec37694b393f285d07802d387882fccdb118d494f25b1acd91c7f194b55ae600c227b81c227fb8e436737f057dabf534e8696b4721dc3ed4bf899d57ede1d7d78938aa8fc0a290687c31e4c9b3a631b6cdf338e0c31799a434579871f4f86e03d33b3dc8e6b4fc50de27e44ebd82435c1536865183b4e0c5d8ab2f65a33ea1a63ab091d7c982f68e60451daef36d982df99e75eae64dabc1eb79a65f4d8c4272e508c457adab28fb687d01d68320e6b5e7b17489f802ce7c665eb8ba5403448409a7f2633c41acc67510776b89d23e7c405327b82b593e7c9bdeb7c7a5a518ed21d9f11d71c24dcd75fd1642e81e201ede4a402c6de72b973f5e6bbb8987fce889661c4dc5073c0c742c036571268a40fdfd4e1a448d5f9f6236cafee4a3b7860dbb3cf3b4d4d680ad94aa5c669aa4267c3aa68db234a011e3a12ef02de0122921fb6ca596eac14aa8b8361591b7b241f2838ebf211d6c0f4929a5aec8761344f863f111f30329dc188c395321001f5d6d9bb07b8191c17c37d437de94aaf3220b9cfe825057b108b443e4ce60674976937e72e5836c2f82de1830f2913cc3d62e86ecfafdc6f7b7fc1f2664705767bbcc322bb7d75f2756ffb9795cfb3a7223f504224eb4ac0ce4c0e093d21e8885a3f31d99ea31ca2df4d109d76dbe2236baa3a71be82a9474232b4bb97354d175dd4d58dd7c2c79797a71539d4228a7d3e7998e86421c410097e92d233922e1f3005703808fcfa43f652536e44b91f86e72d62c2a3d46587c8e8425247c2311d32f063aefbcb1820b3d1ea2309a15c5be2cd964bb7e7bb171d07d23957556e0464e07629b890c6c2cb20cd2c8c79313eb9f785bcec7fe4a7b749076611e30c444c55cccf7e36d0dd0baa30a20eeae0700e18526b7d3fb3a76f7efb6dab48a89dfdc8c76e4205f8e2b7092529ad2af383ed2ae3d0d328713d4abb4c3e1e398c3f290c96766b011976a2b0e94901b5ddf5b3af7", 0x1000}, {&(0x7f0000003080)="6bd4af057de30737df3e96885a7c56a50294", 0x12}, {&(0x7f00000030c0)="ef453610c02fbf5385f5636c27598e3aefb7cbdb5650305919920136d655609cd1ab06ff96435be512af8a285575e1f8732a20630f5dbb990e177f45eabd66f6a1e7773d6765fca84a67bdd07c6bb4759ca16d1dd075aec6fee4569784d4176c3cedca213cfef509f858607efe50813a34e519b836e49d7619912865a649b02fe9de1efc53c8d0b523af60904878a0df", 0x90}, {&(0x7f0000003180)="ed1e53e99cc77612555eeaddaa5b7545c1e84a528199c0abb8448e7e4e4d678788522e7c1c2bb46a079b4c59991da607959cb300d7f81c7a0b20", 0x3a}], 0x6, &(0x7f0000003240)={0x50, 0x113, 0x7, "fc2f50f4231ed55a71a95aac08ebf3bb795ab33b7383b748e8b11b7c3dc8d5a8867ca32d50e6dab5c29ce2d361a22558fea6fcb39d262875bea69e5a36"}, 0x50, 0x2000010}, {&(0x7f00000032c0)={0x27, 0x0, 0x1, 0x2, 0x0, 0x7f, "53c0bb5ccc2b51cf7d4789730500c20a591a41349887fe713cbd4d0a5f90548a1956e1e70fea0ba7ff6226af419c97194c4de77584daf779c2d4d8770dc08c", 0xc}, 0x60, &(0x7f0000003540)=[{&(0x7f0000003340)="01fff05320d435b37f05cfae9dd6c35bc8325c902a15c705bc6bd1ec6f03cfd79957", 0x22}, {&(0x7f0000003380)="8c7156712ec381ad207fe87d4c477f07e1d8aa2f1c796cca7c2e93fde8dcebba63738128e637d3e5a5f090fb3f7501f28c2405fb79cb68b3943778a26e9e7164b7eb9fe66884f5168dd83696b91c5ec2ee", 0x51}, {&(0x7f0000003400)="b61925409db5694c26c1afed1909785d3527232f78c2476edfdc2ce5004bf8f28ca4475ffb884e7a0cfa2ff6e61df6252632599de60fdd93fab9a1491a8723355c9a552958a2a9af64f25f8dcf16615f609d365f6d8dbf84c52f825ede10a4a1c0e18cab2c7518e6b6e084e432e8e31de6406b44d10e2dafd8dff2ff5ffd729dda", 0x81}, {&(0x7f00000034c0)="36fef8db1d1e47b88b427da19727cc34d3c5ca606965edfc6b3bf284fb7084243a78317998a80a5729fa1d9c413fe959abf099f8d5568a214ae4d2d4707e44bce20698a0b330e4f621720010d6652a9bb35b4d9051b0aca1de13d312715fd7b2f5dc2a7e1a935f9eba02365a5963a8130e", 0x71}], 0x4, &(0x7f0000003580)={0xd0, 0x110, 0x68, "e9e7997aeea2f8831d0373be5e43bdffe9d9c287e63683837e0efb4cf7e0eed1d0590d8123fd7b49e7afc21db96c32a82714e523b15f78a9609ab510e5cfc1f910378277f2a003c762ad8130de1b3e8b82c59484e5cebc5d12fdc35ed42b345edefcf2c0244988743d6b1833160ebe2085e35f3b2a4678ab4b7492ea0607298c162af07f1029855ced85c473e3062453b150710874e80ea8f367a414bd47caca2274bf083d9fd47a826dad427144d7c1ce23c16038110a08a7e93f4c805b"}, 0xd0, 0x40000}, {&(0x7f0000003680)={0x27, 0x1, 0x2, 0x0, 0x8, 0x3f, "d181d69192d9e21ffdae7551a55ddaabbd7565bfbfa22c46d2abe2e6a2d4d0a30b7c6454e9c51aaba424c44c72ac0569ef7a5298d214fc8acdf0edf141a5db", 0x34}, 0x60, &(0x7f0000004900)=[{&(0x7f0000003700)="dc2d47d24b9aa528f9f4144f635754320fa14699799d0e5045e12e56b043e81b667b156efa71046d22bae187ed1ee54868654c32b3ae8e5e2cf284362d3c211c9a133a0ae2f30c1c3c151985ca14bc6488ca1bb4d94559206b9fdda41179fae49b2445b8740b07345fe2f742af1c158cb5884511de411ed5476f452ac612a17dcc8ffaa4d29d18", 0x87}, {&(0x7f00000037c0)="5b0f18d9b78a2b8ea25307f3491b2ef048132d115aae0a0a1582ee02d67a5d43fca55b77188d353177748a3a52711fb89242496bcdb836c6b26ea13cbcc9168e4a67443727a7ca3e06e402e76f835b01e215a07e9c7cde772a5ac45561362959445e68872a5ced25ddea5f11ed53a9a9792626814b3a81925688767238ce7ad0c99204e97d6706f7c0a670059ddc835358bd6272", 0x94}, {&(0x7f0000003880)="9a5a378c7815a5a86fd8319b153848da5063aee9e814fdf040be54464c62a347513f0eb999e511e1ab008082241d10ed6a6c488c05f1876523c4dca28381ee0dafdf01d88ba4d2cacc3993b4f748bcddab5cc82f66ac0afbc18f78738d375417384eda95c310db325a6d0989", 0x6c}, {&(0x7f0000003900)="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", 0x1000}], 0x4, &(0x7f0000004940)={0x50, 0x10a, 0x1ff, "f0c7d4a89753d5feffda8932feab71438617ff812306d3864371d94dc7b7e51ff024eec1972b0b19fc48f051df006d1a99afa7d2af64d3f4ac379513"}, 0x50}], 0x7, 0x20000827) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) 03:37:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x10, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x8, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@isdn, &(0x7f00000000c0)=0x80) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000050000000000000000000000ffffffff010000001900000000000000000076657461315f746f5f0400000000000065727370626e300000000000000000006272696466655f736c6176655f31000069653e841901e50ac9000000000000000180c2000000000000000000aaaabfaaaa000000000000000000d4000000d40000001c010000636c757374e57200000000000000002000000000000000000000000000000000000000000000008e8300000000000000000000007265616c6d0000000000000000000000000000000000000000008000000000000c0000000000000000000000000000006c6f67000000000000000000000000000000000000000000000000000000000024000000004608fdc2eedaf8ff6fcbc6a67ee31e6bfa4cf9f0761ffdac96c7d300bc1d000000000000000000000000000000080000000000000000000000000000000000000000000000000001000000feffffff00000000"]}, 0x224) connect(r0, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @broadcast}, 0x3, 0x2, 0x1, 0x2}}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x101, 0x0, 0x0, 0x100032, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video1\x00', 0x2, 0x0) 03:37:23 executing program 4: mq_open(&(0x7f0000000000)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x0, 0x2, &(0x7f0000000080)={0x8, 0x1f, 0x1, 0x8001, 0x1, 0x5, 0x2, 0x2}) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xd48fd6c20bf5d37a}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r2, 0x702, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x800, @link='syz0\x00'}}}, ["", "", "", "", ""]}, 0x68}}, 0x24000000) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) 03:37:23 executing program 3: write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x10f, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:23 executing program 3: write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) [ 611.029490] EXT4-fs (sda1): re-mounted. Opts: 03:37:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:23 executing program 3: write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:23 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0x4, 0x8, "905b203090a98822b68bb1a39bcd9f61d9aa26f83e91c6f2f7f37d4e670d66c57684deedc35169c0c348e58363f05ab5c7edf0d687593c501d197b2f612f7f645ff61502c6678142d9fbf74a4db880d74ba6469682af3d6366bcc48a26f90238071bc12311c29465973398310340f3788b583ba115b306dd6f229dda86aa63f37866ccc9f2828c0f58f90f37a978e1271ef473b958ed24880504df400ccd5c123ecee3bc73253fe5fda99525785b3d1b72de1f40125cb7d03ecb6dc9bed1cd34c351b471741e6f2985a4d909cb2125bba7cb8b4571a89d2450bdc43595238cc7b9ba90030373310e35786f75aec201211dce975499c35adb0faca826453714a0", 0x49, 0xff, 0x80, 0x8, 0x4, 0x5, 0x9, 0x1}, r0}}, 0x120) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000400)=""/110, &(0x7f0000000480)=0x6e) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x0, 0x2) write$UHID_SET_REPORT_REPLY(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="0e0000000600000003ff1d00c0ba0e512f65991819bb940d62a683fbdca77340e4e37b5c5e29edc966"], 0x29) syz_read_part_table(0x2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="6c2bac4a6c61a10f5c3efc4134a373c1de4cbfb830a44fd77aee6d33caa3ef82ea3be015c95657ba1b77974fdfb8babdf381ab1c5c61d07c324bb541323873ebedd3fe731f27762e00dfe1dda1e685d081d93c21da3592179eda64c253773554ca94e0bca6df0dbf803a87fe84585ac6c40a9c52b335ae075fbe98fb55c2bb28e236afe8869f9d11cf1eaff700f1d4d4984cdced1ac218802fc796f388b5afa83097bde9c1f04e454eb6c1af770c", 0xae, 0x8}]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) 03:37:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa04, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:23 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) 03:37:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) [ 611.431260] IPVS: length: 110 != 8 03:37:24 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x4, 'oZn', "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"}}, 0x110) [ 611.696421] IPVS: length: 110 != 8 03:37:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0f5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) 03:37:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/86) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) 03:37:24 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) [ 612.028805] EXT4-fs (sda1): re-mounted. Opts: 03:37:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:24 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, &(0x7f0000000000)=""/229) 03:37:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) [ 612.266069] EXT4-fs (sda1): re-mounted. Opts: 03:37:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, 0x0, 0x0) 03:37:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x141040) getsockname$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x102800, &(0x7f0000000300)='/dev/vcs#\x00') r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000080), 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) 03:37:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, 0x0, 0x0) 03:37:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000140)=@v2={0x7, 0x0, 0x14, 0x4, 0xbe, "c5463199ac68b258bf68079d65e8420745060669d9bf04e67b32135a16d2e565155adc5254acc5386d21c260b6d99b66a89a4597fca633c2ef78ea84a3be19e05a4b650d157448895db902d11e447c9ecd4429dde400888f3c276b3bbddc794b60e6067d7fe0e0c79459bef3340eb77f3af70da6a3155cb745f09c284f279da45bca23d77983f950c22d87bfb3630da6471123e385520fd1c05b086711e89cc9223836bd0262769b99e23512c7c595bf32d167cba9cdd1ba469fcf876741"}, 0xc8, 0x2) [ 612.604316] EXT4-fs (sda1): re-mounted. Opts: 03:37:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, 0x0, 0x0) [ 612.701102] EXT4-fs (sda1): re-mounted. Opts: 03:37:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x140) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000040)=""/248) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x4000, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x40, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@loose='loose'}, {@version_9p2000='version=9p2000'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) 03:37:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@isdn, &(0x7f00000000c0)=0x80) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) connect(r0, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @broadcast}, 0x3, 0x2, 0x1, 0x2}}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x101, 0x0, 0x0, 0x100032, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video1\x00', 0x2, 0x0) 03:37:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) [ 613.182796] 9pnet: Insufficient options for proto=fd 03:37:25 executing program 3 (fault-call:1 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) [ 613.234626] EXT4-fs (sda1): re-mounted. Opts: [ 613.335532] 9pnet: Insufficient options for proto=fd [ 613.369725] FAULT_INJECTION: forcing a failure. [ 613.369725] name failslab, interval 1, probability 0, space 0, times 0 03:37:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) [ 613.437353] CPU: 0 PID: 21902 Comm: syz-executor.3 Not tainted 4.19.78 #0 [ 613.444326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.453688] Call Trace: [ 613.456290] dump_stack+0x172/0x1f0 [ 613.459938] should_fail.cold+0xa/0x1b [ 613.463846] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 613.468980] __should_failslab+0x121/0x190 [ 613.473402] should_failslab+0x9/0x14 [ 613.477212] __kmalloc+0x2e2/0x750 [ 613.480767] ? ext4_find_extent+0x76e/0x9d0 [ 613.487529] ext4_find_extent+0x76e/0x9d0 [ 613.491693] ext4_ext_map_blocks+0x1c3/0x55c0 [ 613.496207] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 613.501234] ? __lock_is_held+0xb6/0x140 [ 613.505322] ? lock_acquire+0x16f/0x3f0 [ 613.509302] ? ext4_map_blocks+0x4cf/0x1b20 [ 613.513634] ext4_map_blocks+0xf83/0x1b20 [ 613.517793] ? ext4_issue_zeroout+0x170/0x170 [ 613.522292] ? __might_sleep+0x95/0x190 [ 613.526281] ? ext4_journal_check_start+0x18d/0x220 [ 613.531306] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 613.536852] ? __ext4_journal_start_sb+0x12d/0x490 [ 613.541792] ext4_iomap_begin+0x450/0xfd0 [ 613.545952] ? ext4_dio_get_block+0xc0/0xc0 [ 613.550279] ? ext4_mark_inode_dirty+0x24d/0x940 [ 613.555043] ? ext4_expand_extra_isize+0x550/0x550 [ 613.559985] ? __might_sleep+0x95/0x190 [ 613.563971] iomap_apply+0x106/0x2b0 [ 613.567718] ? dax_iomap_rw+0x360/0x360 [ 613.571705] ? iomap_dirty_actor+0x6c0/0x6c0 [ 613.576123] ? rcu_read_lock_sched_held+0x110/0x130 [ 613.581146] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 613.586175] ? __lock_is_held+0xb6/0x140 [ 613.590341] dax_iomap_rw+0x212/0x360 [ 613.594146] ? dax_iomap_rw+0x360/0x360 [ 613.598142] ext4_file_write_iter+0xb5e/0x1060 [ 613.602737] ? mark_held_locks+0x100/0x100 [ 613.606981] ? kasan_check_read+0x11/0x20 [ 613.611151] ? ext4_file_mmap+0x410/0x410 [ 613.615309] ? mark_held_locks+0x100/0x100 [ 613.619554] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 613.625103] ? iov_iter_init+0xc6/0x1f0 [ 613.629093] __vfs_write+0x587/0x810 [ 613.632812] ? kernel_read+0x120/0x120 [ 613.636803] ? rcu_read_lock_sched_held+0x110/0x130 [ 613.641821] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 613.646584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 613.652133] ? __sb_start_write+0x1a9/0x360 [ 613.656466] vfs_write+0x20c/0x560 [ 613.660029] ksys_write+0x14f/0x2d0 [ 613.663672] ? __ia32_sys_read+0xb0/0xb0 [ 613.667744] ? do_syscall_64+0x26/0x620 [ 613.671732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 613.677105] ? do_syscall_64+0x26/0x620 [ 613.681097] __x64_sys_write+0x73/0xb0 [ 613.684997] do_syscall_64+0xfd/0x620 [ 613.688808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 613.693998] RIP: 0033:0x459a59 [ 613.697194] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 613.716221] RSP: 002b:00007fe3a0b14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 613.723954] RAX: ffffffffffffffda RBX: 00007fe3a0b14c90 RCX: 0000000000459a59 [ 613.731237] RDX: 0000000000000018 RSI: 00000000200000c0 RDI: 0000000000000003 [ 613.738543] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 613.745837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe3a0b156d4 [ 613.753138] R13: 00000000004c9fc5 R14: 00000000004e1c58 R15: 0000000000000004 [ 613.774764] EXT4-fs (sda1): re-mounted. Opts: 03:37:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:26 executing program 3 (fault-call:1 fault-nth:1): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) [ 613.998457] FAULT_INJECTION: forcing a failure. [ 613.998457] name failslab, interval 1, probability 0, space 0, times 0 [ 614.010240] CPU: 1 PID: 21915 Comm: syz-executor.3 Not tainted 4.19.78 #0 [ 614.017184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.026550] Call Trace: [ 614.029158] dump_stack+0x172/0x1f0 [ 614.032809] should_fail.cold+0xa/0x1b [ 614.036709] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 614.041827] ? save_stack+0xa9/0xd0 [ 614.045475] ? __es_tree_search.isra.0+0x1bf/0x230 [ 614.050407] ? save_stack+0x45/0xd0 [ 614.054831] __should_failslab+0x121/0x190 [ 614.059101] should_failslab+0x9/0x14 [ 614.062912] kmem_cache_alloc+0x47/0x700 [ 614.066981] ? ext4_es_scan+0x730/0x730 [ 614.070970] __es_insert_extent+0x2cc/0xf20 [ 614.075312] ? do_raw_write_lock+0xbd/0x1e0 [ 614.079663] ext4_es_insert_extent+0x27e/0x640 [ 614.084257] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 614.090069] ? rcu_read_lock_sched_held+0x110/0x130 [ 614.095092] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 614.100640] ? ext4_es_find_delayed_extent_range+0x387/0xa30 [ 614.106449] ext4_ext_put_gap_in_cache+0xf7/0x150 [ 614.111306] ? ext4_zeroout_es+0x180/0x180 [ 614.115790] ? ext4_find_extent+0x76e/0x9d0 [ 614.120124] ? ext4_find_extent+0x6a6/0x9d0 [ 614.124463] ext4_ext_map_blocks+0x204c/0x55c0 [ 614.129067] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 614.134096] ? __lock_is_held+0xb6/0x140 [ 614.138174] ? lock_acquire+0x16f/0x3f0 [ 614.142155] ? ext4_map_blocks+0x4cf/0x1b20 [ 614.146501] ext4_map_blocks+0xf83/0x1b20 [ 614.151627] ? ext4_issue_zeroout+0x170/0x170 [ 614.156125] ? __might_sleep+0x95/0x190 [ 614.160110] ? ext4_journal_check_start+0x18d/0x220 [ 614.165167] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 614.170709] ? __ext4_journal_start_sb+0x12d/0x490 [ 614.175648] ext4_iomap_begin+0x450/0xfd0 [ 614.179819] ? ext4_dio_get_block+0xc0/0xc0 [ 614.184147] ? ext4_mark_inode_dirty+0x24d/0x940 [ 614.188918] ? ext4_expand_extra_isize+0x550/0x550 [ 614.193866] ? __might_sleep+0x95/0x190 [ 614.197865] iomap_apply+0x106/0x2b0 [ 614.201596] ? dax_iomap_rw+0x360/0x360 [ 614.205597] ? iomap_dirty_actor+0x6c0/0x6c0 [ 614.210014] ? rcu_read_lock_sched_held+0x110/0x130 [ 614.215043] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 614.220078] ? __lock_is_held+0xb6/0x140 [ 614.224158] dax_iomap_rw+0x212/0x360 [ 614.227965] ? dax_iomap_rw+0x360/0x360 [ 614.232053] ext4_file_write_iter+0xb5e/0x1060 [ 614.236642] ? mark_held_locks+0x100/0x100 [ 614.240884] ? kasan_check_read+0x11/0x20 [ 614.245044] ? ext4_file_mmap+0x410/0x410 [ 614.249202] ? mark_held_locks+0x100/0x100 [ 614.253475] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 614.259019] ? iov_iter_init+0xc6/0x1f0 [ 614.263007] __vfs_write+0x587/0x810 [ 614.266731] ? kernel_read+0x120/0x120 [ 614.270638] ? rcu_read_lock_sched_held+0x110/0x130 [ 614.275663] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 614.280437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 614.285988] ? __sb_start_write+0x1a9/0x360 [ 614.290329] vfs_write+0x20c/0x560 [ 614.294315] ksys_write+0x14f/0x2d0 [ 614.297952] ? __ia32_sys_read+0xb0/0xb0 [ 614.302022] ? do_syscall_64+0x26/0x620 [ 614.306006] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.311403] ? do_syscall_64+0x26/0x620 [ 614.315388] __x64_sys_write+0x73/0xb0 [ 614.319294] do_syscall_64+0xfd/0x620 [ 614.323113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.328312] RIP: 0033:0x459a59 [ 614.331515] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:37:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xfffffffffffffebc, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)='ramfs\x00', r5}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r5}, 0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x1, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r8, 0xc06855c8, &(0x7f0000000900)={0x7, 0x7, {0x50, 0x6ab5, 0x2, {0xd4, 0x80}, {0xff, 0x7f}, @ramp={0x81, 0x3ff, {0x4, 0x6, 0x97, 0x1}}}, {0x55, 0x1ff, 0x40, {0x387, 0xfffa}, {0x3, 0x503}, @rumble={0x8000}}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) r10 = getegid() stat(0x0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r11}], {}, [{0x8, 0xd, r12}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) r13 = getgid() setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010006000000000002000200", @ANYRES32=r1, @ANYBLOB="02000300", @ANYRES32=r2, @ANYBLOB="020007001ebf43ba4b34ca30e2a0a80affb61ab50a520b0fda1fbd7584ca786dabc520da042ff1f43e61e1cc37940d32ef0746fa85ec36533b6c82e57e08e21928576c64a84f90b323697e0b0000000000007a52c75dd2963eb375376fb004a240bd41768eaf34d2a3107c2e274c18902db875720e6c8a7f9a397a3e807317e796fae333b84fdf4c895bee4aa47b73adb45dd179873c612538227984e11e54850cb09d166ddf71e9ac9cd0b7b975a942ef6a9e960c039ab4bb3dc5004881fe1779c32e487cdd000040000000", @ANYRES32=r4, @ANYBLOB="0200050092420dfcf35117dd19b9b4a4f4e33050", @ANYRES32=r7, @ANYBLOB="fb000000", @ANYRES32=r9, @ANYBLOB="040000000000000008000000", @ANYRES32=r10, @ANYBLOB="08000600", @ANYRES32=r12, @ANYBLOB="fd42ba49", @ANYRES32=r13, @ANYRESOCT=r11], 0x11, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x160) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8, 0x48881) ioctl$KIOCSOUND(r0, 0x4b2f, 0x9f74) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) 03:37:26 executing program 3 (fault-call:1 fault-nth:2): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) [ 614.582914] EXT4-fs (sda1): re-mounted. Opts: [ 614.603332] FAULT_INJECTION: forcing a failure. [ 614.603332] name failslab, interval 1, probability 0, space 0, times 0 [ 614.627329] FAULT_INJECTION: forcing a failure. [ 614.627329] name failslab, interval 1, probability 0, space 0, times 0 [ 614.640554] CPU: 0 PID: 21933 Comm: syz-executor.3 Not tainted 4.19.78 #0 [ 614.647504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.656877] Call Trace: [ 614.659527] dump_stack+0x172/0x1f0 [ 614.663177] should_fail.cold+0xa/0x1b [ 614.667081] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 614.672196] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 614.678022] __should_failslab+0x121/0x190 [ 614.682274] should_failslab+0x9/0x14 [ 614.686092] __kmalloc+0x2e2/0x750 [ 614.686113] ? ext4_find_extent+0x76e/0x9d0 [ 614.686130] ext4_find_extent+0x76e/0x9d0 [ 614.698128] ext4_ext_map_blocks+0x1c3/0x55c0 [ 614.698153] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 614.698171] ? __lock_is_held+0xb6/0x140 [ 614.698192] ? lock_acquire+0x16f/0x3f0 [ 614.698206] ? ext4_map_blocks+0x928/0x1b20 [ 614.698231] ext4_map_blocks+0x990/0x1b20 [ 614.724294] ? ext4_issue_zeroout+0x170/0x170 [ 614.728800] ? __might_sleep+0x95/0x190 [ 614.732788] ? ext4_journal_check_start+0x18d/0x220 [ 614.737822] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 614.743414] ? __ext4_journal_start_sb+0x12d/0x490 [ 614.748367] ext4_iomap_begin+0x450/0xfd0 [ 614.752538] ? ext4_dio_get_block+0xc0/0xc0 [ 614.756960] ? ext4_mark_inode_dirty+0x24d/0x940 [ 614.761732] ? ext4_expand_extra_isize+0x550/0x550 [ 614.766810] ? __might_sleep+0x95/0x190 [ 614.770802] iomap_apply+0x106/0x2b0 [ 614.774540] ? dax_iomap_rw+0x360/0x360 [ 614.778524] ? iomap_dirty_actor+0x6c0/0x6c0 [ 614.782939] ? rcu_read_lock_sched_held+0x110/0x130 [ 614.788052] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 614.793082] ? __lock_is_held+0xb6/0x140 [ 614.797152] dax_iomap_rw+0x212/0x360 [ 614.800966] ? dax_iomap_rw+0x360/0x360 [ 614.804966] ext4_file_write_iter+0xb5e/0x1060 [ 614.809555] ? mark_held_locks+0x100/0x100 [ 614.813801] ? kasan_check_read+0x11/0x20 [ 614.817970] ? ext4_file_mmap+0x410/0x410 [ 614.822133] ? mark_held_locks+0x100/0x100 [ 614.826388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 614.831937] ? iov_iter_init+0xc6/0x1f0 [ 614.835927] __vfs_write+0x587/0x810 [ 614.839657] ? kernel_read+0x120/0x120 [ 614.843564] ? rcu_read_lock_sched_held+0x110/0x130 [ 614.848590] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 614.853352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 614.858897] ? __sb_start_write+0x1a9/0x360 [ 614.863230] vfs_write+0x20c/0x560 [ 614.866782] ksys_write+0x14f/0x2d0 [ 614.870421] ? __ia32_sys_read+0xb0/0xb0 [ 614.874496] ? do_syscall_64+0x26/0x620 [ 614.878480] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.883852] ? do_syscall_64+0x26/0x620 [ 614.887847] __x64_sys_write+0x73/0xb0 [ 614.891748] do_syscall_64+0xfd/0x620 [ 614.895562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.903708] RIP: 0033:0x459a59 [ 614.906910] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 614.925815] RSP: 002b:00007fe3a0b14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 614.933536] RAX: ffffffffffffffda RBX: 00007fe3a0b14c90 RCX: 0000000000459a59 [ 614.940940] RDX: 0000000000000018 RSI: 00000000200000c0 RDI: 0000000000000003 [ 614.948223] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 614.955502] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe3a0b156d4 [ 614.962777] R13: 00000000004c9fc5 R14: 00000000004e1c58 R15: 0000000000000004 [ 614.970077] CPU: 1 PID: 21936 Comm: syz-executor.4 Not tainted 4.19.78 #0 [ 614.977014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.986373] Call Trace: [ 614.988974] dump_stack+0x172/0x1f0 [ 614.992618] should_fail.cold+0xa/0x1b [ 614.996516] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 615.001629] ? lock_downgrade+0x880/0x880 [ 615.005829] __should_failslab+0x121/0x190 [ 615.010081] should_failslab+0x9/0x14 [ 615.013898] kmem_cache_alloc+0x2ae/0x700 [ 615.018058] ? kasan_check_write+0x14/0x20 [ 615.022303] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 615.027156] ? check_preemption_disabled+0x48/0x290 [ 615.032190] getname_flags+0xd6/0x5b0 [ 615.036012] getname+0x1a/0x20 [ 615.039213] do_sys_open+0x2c9/0x550 [ 615.042930] ? fput+0x128/0x1a0 [ 615.046225] ? filp_open+0x80/0x80 [ 615.049775] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 615.054546] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 615.059308] ? do_syscall_64+0x26/0x620 [ 615.063289] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.068659] ? do_syscall_64+0x26/0x620 [ 615.072644] __x64_sys_openat+0x9d/0x100 [ 615.076711] do_syscall_64+0xfd/0x620 [ 615.080526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.085720] RIP: 0033:0x459a59 [ 615.088918] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.107826] RSP: 002b:00007f4467519c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 615.115547] RAX: ffffffffffffffda RBX: 00007f4467519c90 RCX: 0000000000459a59 [ 615.122822] RDX: 0000000000002761 RSI: 0000000020000480 RDI: ffffffffffffffff [ 615.130096] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 615.137370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f446751a6d4 [ 615.144654] R13: 00000000004c64ee R14: 00000000004db778 R15: 0000000000000003 03:37:27 executing program 3 (fault-call:1 fault-nth:3): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) [ 615.159816] EXT4-fs (sda1): re-mounted. Opts: 03:37:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:27 executing program 4 (fault-call:0 fault-nth:1): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) [ 615.238120] FAULT_INJECTION: forcing a failure. [ 615.238120] name failslab, interval 1, probability 0, space 0, times 0 [ 615.289199] CPU: 0 PID: 21947 Comm: syz-executor.3 Not tainted 4.19.78 #0 [ 615.296162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.305519] Call Trace: [ 615.308123] dump_stack+0x172/0x1f0 [ 615.311768] should_fail.cold+0xa/0x1b [ 615.315676] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 615.320805] __should_failslab+0x121/0x190 [ 615.325055] should_failslab+0x9/0x14 [ 615.328871] kmem_cache_alloc+0x2ae/0x700 [ 615.333107] ? rcu_read_lock_sched_held+0x110/0x130 [ 615.338133] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 615.343747] ? __mark_inode_dirty+0x241/0x1280 [ 615.348323] ext4_mb_new_blocks+0x5a0/0x3c10 [ 615.352724] ? ext4_find_extent+0x76e/0x9d0 [ 615.357059] ext4_ext_map_blocks+0x2b26/0x55c0 [ 615.361637] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 615.366645] ? __lock_is_held+0xb6/0x140 [ 615.370711] ext4_map_blocks+0x990/0x1b20 [ 615.374854] ? ext4_issue_zeroout+0x170/0x170 [ 615.379336] ? __might_sleep+0x95/0x190 [ 615.383301] ? ext4_journal_check_start+0x18d/0x220 [ 615.388308] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 615.393835] ? __ext4_journal_start_sb+0x12d/0x490 [ 615.398758] ext4_iomap_begin+0x450/0xfd0 [ 615.402902] ? ext4_dio_get_block+0xc0/0xc0 [ 615.407228] ? ext4_mark_inode_dirty+0x24d/0x940 [ 615.411974] ? ext4_expand_extra_isize+0x550/0x550 [ 615.416895] ? __might_sleep+0x95/0x190 [ 615.420868] iomap_apply+0x106/0x2b0 [ 615.424571] ? dax_iomap_rw+0x360/0x360 [ 615.428537] ? iomap_dirty_actor+0x6c0/0x6c0 [ 615.433020] ? rcu_read_lock_sched_held+0x110/0x130 [ 615.438024] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 615.443033] ? __lock_is_held+0xb6/0x140 [ 615.447092] dax_iomap_rw+0x212/0x360 [ 615.450895] ? dax_iomap_rw+0x360/0x360 [ 615.454866] ext4_file_write_iter+0xb5e/0x1060 [ 615.459434] ? mark_held_locks+0x100/0x100 [ 615.463659] ? kasan_check_read+0x11/0x20 [ 615.467802] ? ext4_file_mmap+0x410/0x410 [ 615.471938] ? mark_held_locks+0x100/0x100 [ 615.476163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 615.481689] ? iov_iter_init+0xc6/0x1f0 [ 615.485655] __vfs_write+0x587/0x810 [ 615.489361] ? kernel_read+0x120/0x120 [ 615.493245] ? rcu_read_lock_sched_held+0x110/0x130 [ 615.498252] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 615.503012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 615.508538] ? __sb_start_write+0x1a9/0x360 [ 615.512865] vfs_write+0x20c/0x560 [ 615.516397] ksys_write+0x14f/0x2d0 [ 615.520027] ? __ia32_sys_read+0xb0/0xb0 [ 615.524077] ? do_syscall_64+0x26/0x620 [ 615.528044] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.533405] ? do_syscall_64+0x26/0x620 [ 615.537371] __x64_sys_write+0x73/0xb0 [ 615.541250] do_syscall_64+0xfd/0x620 [ 615.545059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.550258] RIP: 0033:0x459a59 [ 615.553450] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.572338] RSP: 002b:00007fe3a0b14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 615.580036] RAX: ffffffffffffffda RBX: 00007fe3a0b14c90 RCX: 0000000000459a59 03:37:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000100)={0x6, 0x400, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x81, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x32200, 0x0) connect$bt_sco(r0, &(0x7f0000000080)={0x1f, {0x2, 0x4, 0xf5, 0x74, 0x0, 0x5}}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1f, 0x0, 0x0, 0x101030, 0x0) 03:37:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) [ 615.587293] RDX: 0000000000000018 RSI: 00000000200000c0 RDI: 0000000000000003 [ 615.594548] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 615.601804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe3a0b156d4 [ 615.609061] R13: 00000000004c9fc5 R14: 00000000004e1c58 R15: 0000000000000004 [ 615.723844] FAULT_INJECTION: forcing a failure. [ 615.723844] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 615.735709] CPU: 0 PID: 21956 Comm: syz-executor.4 Not tainted 4.19.78 #0 [ 615.742645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.752006] Call Trace: [ 615.754622] dump_stack+0x172/0x1f0 [ 615.758272] should_fail.cold+0xa/0x1b [ 615.762171] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 615.767289] ? mark_held_locks+0x100/0x100 [ 615.772751] __alloc_pages_nodemask+0x1ee/0x750 [ 615.777525] ? __alloc_pages_slowpath+0x2870/0x2870 [ 615.782558] ? find_held_lock+0x35/0x130 [ 615.786650] cache_grow_begin+0x91/0x8c0 [ 615.790724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 615.796278] ? check_preemption_disabled+0x48/0x290 [ 615.801310] kmem_cache_alloc+0x63b/0x700 [ 615.805729] ? kasan_check_write+0x14/0x20 [ 615.810008] getname_flags+0xd6/0x5b0 [ 615.813822] getname+0x1a/0x20 [ 615.817032] do_sys_open+0x2c9/0x550 [ 615.820842] ? fput+0x128/0x1a0 [ 615.824133] ? filp_open+0x80/0x80 [ 615.827691] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 615.832452] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 615.837216] ? do_syscall_64+0x26/0x620 [ 615.841196] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.846566] ? do_syscall_64+0x26/0x620 [ 615.850565] __x64_sys_openat+0x9d/0x100 [ 615.854641] do_syscall_64+0xfd/0x620 [ 615.858455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.863646] RIP: 0033:0x459a59 [ 615.866847] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.885756] RSP: 002b:00007f4467519c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 615.893481] RAX: ffffffffffffffda RBX: 00007f4467519c90 RCX: 0000000000459a59 [ 615.900757] RDX: 0000000000002761 RSI: 0000000020000480 RDI: ffffffffffffffff [ 615.908062] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 615.915335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f446751a6d4 03:37:28 executing program 3 (fault-call:1 fault-nth:4): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) [ 615.922633] R13: 00000000004c64ee R14: 00000000004db778 R15: 0000000000000003 03:37:28 executing program 4 (fault-call:0 fault-nth:2): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) [ 616.121279] FAULT_INJECTION: forcing a failure. [ 616.121279] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 616.133127] CPU: 0 PID: 21979 Comm: syz-executor.4 Not tainted 4.19.78 #0 [ 616.140067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.149427] Call Trace: [ 616.152033] dump_stack+0x172/0x1f0 [ 616.155681] should_fail.cold+0xa/0x1b [ 616.159586] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 616.164702] ? mark_held_locks+0x100/0x100 [ 616.168957] __alloc_pages_nodemask+0x1ee/0x750 [ 616.173642] ? find_held_lock+0x35/0x130 [ 616.177719] ? __alloc_pages_slowpath+0x2870/0x2870 [ 616.182778] cache_grow_begin+0x91/0x8c0 [ 616.186850] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 616.192394] ? check_preemption_disabled+0x48/0x290 [ 616.197424] kmem_cache_alloc+0x63b/0x700 [ 616.201591] __alloc_file+0x27/0x330 [ 616.205317] alloc_empty_file+0x72/0x170 [ 616.209479] path_openat+0xef/0x45e0 [ 616.213370] ? __lock_acquire+0x6ee/0x49c0 [ 616.217608] ? getname_flags+0xd6/0x5b0 [ 616.221587] ? getname+0x1a/0x20 [ 616.224958] ? do_sys_open+0x2c9/0x550 [ 616.229721] ? __x64_sys_openat+0x9d/0x100 [ 616.233990] ? do_syscall_64+0xfd/0x620 [ 616.237979] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.243367] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 616.248056] ? __lock_is_held+0xb6/0x140 [ 616.252139] ? find_held_lock+0x35/0x130 [ 616.256213] do_filp_open+0x1a1/0x280 [ 616.260021] ? __alloc_fd+0x44d/0x560 [ 616.263830] ? may_open_dev+0x100/0x100 [ 616.267817] ? lock_downgrade+0x880/0x880 [ 616.271980] ? kasan_check_read+0x11/0x20 [ 616.276135] ? do_raw_spin_unlock+0x57/0x270 [ 616.280556] ? __alloc_fd+0x44d/0x560 [ 616.284371] do_sys_open+0x3fe/0x550 [ 616.288097] ? fput+0x128/0x1a0 [ 616.291387] ? filp_open+0x80/0x80 [ 616.294938] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 616.299700] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 616.304464] ? do_syscall_64+0x26/0x620 [ 616.308449] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.313820] ? do_syscall_64+0x26/0x620 [ 616.317808] __x64_sys_openat+0x9d/0x100 [ 616.321885] do_syscall_64+0xfd/0x620 [ 616.325699] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.330894] RIP: 0033:0x459a59 [ 616.334441] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.353370] RSP: 002b:00007f4467519c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 616.362043] RAX: ffffffffffffffda RBX: 00007f4467519c90 RCX: 0000000000459a59 [ 616.369323] RDX: 0000000000002761 RSI: 0000000020000480 RDI: ffffffffffffffff [ 616.376597] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 616.383873] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f446751a6d4 [ 616.391150] R13: 00000000004c64ee R14: 00000000004db778 R15: 0000000000000003 03:37:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360f7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) 03:37:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="e24ba36573da80c5e8eeb0f6b6ebf51e200a5f99585fc9e3afaf11ff7d3f2da6fcd9840a84e3db873734eeb34d3bbce0853979928d8f176afb2684a62f5920a962e366a310b6eaf5f116d9abefee00598b6b4770efb7de4fb39c617f4bf292c18b30d200a4cd7d6ff819c2cb45d4e7940dd3"], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x80000, &(0x7f0000000100)='\x00') keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000040)='\x00', &(0x7f0000000240)) [ 616.570878] FAULT_INJECTION: forcing a failure. [ 616.570878] name failslab, interval 1, probability 0, space 0, times 0 [ 616.604328] CPU: 0 PID: 21988 Comm: syz-executor.3 Not tainted 4.19.78 #0 [ 616.611304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.620665] Call Trace: [ 616.623634] dump_stack+0x172/0x1f0 [ 616.623658] should_fail.cold+0xa/0x1b [ 616.623678] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 616.636272] ? __kernel_text_address+0xd/0x40 [ 616.640790] ? mempool_alloc+0x380/0x380 [ 616.644860] __should_failslab+0x121/0x190 [ 616.644877] should_failslab+0x9/0x14 [ 616.644893] kmem_cache_alloc+0x47/0x700 [ 616.656967] ? mempool_alloc+0x380/0x380 [ 616.661039] mempool_alloc_slab+0x47/0x60 [ 616.665200] mempool_alloc+0x169/0x380 [ 616.669104] ? mempool_destroy+0x40/0x40 [ 616.673177] ? lock_downgrade+0x880/0x880 [ 616.677343] ? kasan_check_read+0x11/0x20 [ 616.681533] bio_alloc_bioset+0x3cd/0x690 [ 616.685705] ? bvec_alloc+0x2f0/0x2f0 [ 616.689516] ? find_get_entries+0xac0/0xac0 [ 616.693931] next_bio+0x2a/0x60 [ 616.697230] __blkdev_issue_write_zeroes+0x1e2/0x510 [ 616.702349] blkdev_issue_zeroout+0x1c7/0x4c0 [ 616.706855] ? __blkdev_issue_zeroout+0x1a0/0x1a0 [ 616.711709] ? create_page_buffers+0x390/0x390 [ 616.716305] ? __lock_is_held+0xb6/0x140 [ 616.720396] ext4_issue_zeroout+0xfe/0x170 [ 616.724640] ext4_map_blocks+0x1480/0x1b20 [ 616.728892] ? ext4_issue_zeroout+0x170/0x170 [ 616.733411] ? __might_sleep+0x95/0x190 [ 616.737397] ? ext4_journal_check_start+0x18d/0x220 [ 616.742434] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 616.747986] ? __ext4_journal_start_sb+0x12d/0x490 [ 616.752934] ext4_iomap_begin+0x450/0xfd0 [ 616.757103] ? ext4_dio_get_block+0xc0/0xc0 [ 616.761446] ? mark_held_locks+0xb1/0x100 [ 616.765609] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 616.770718] ? current_time+0x6f/0x140 [ 616.774612] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 616.779722] ? lockdep_hardirqs_on+0x415/0x5d0 [ 616.784324] iomap_apply+0x106/0x2b0 [ 616.788053] ? dax_iomap_rw+0x360/0x360 [ 616.792041] ? iomap_dirty_actor+0x6c0/0x6c0 [ 616.796453] ? current_time+0xde/0x140 [ 616.800356] ? __lock_is_held+0xb6/0x140 [ 616.804441] dax_iomap_rw+0x212/0x360 [ 616.808274] ? dax_iomap_rw+0x360/0x360 [ 616.812272] ext4_file_write_iter+0xb5e/0x1060 [ 616.816867] ? mark_held_locks+0x100/0x100 [ 616.821122] ? kasan_check_read+0x11/0x20 [ 616.825280] ? ext4_file_mmap+0x410/0x410 [ 616.829445] ? mark_held_locks+0x100/0x100 [ 616.833692] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 616.839239] ? iov_iter_init+0xc6/0x1f0 [ 616.843227] __vfs_write+0x587/0x810 [ 616.846951] ? kernel_read+0x120/0x120 [ 616.850863] ? rcu_read_lock_sched_held+0x110/0x130 [ 616.855889] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 616.860658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 616.866210] ? __sb_start_write+0x1a9/0x360 [ 616.870543] vfs_write+0x20c/0x560 [ 616.874098] ksys_write+0x14f/0x2d0 [ 616.877735] ? __ia32_sys_read+0xb0/0xb0 [ 616.881808] ? do_syscall_64+0x26/0x620 [ 616.885794] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.891171] ? do_syscall_64+0x26/0x620 [ 616.895164] __x64_sys_write+0x73/0xb0 [ 616.899062] do_syscall_64+0xfd/0x620 [ 616.902880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.908427] RIP: 0033:0x459a59 [ 616.911804] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.930711] RSP: 002b:00007fe3a0b14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 616.938428] RAX: ffffffffffffffda RBX: 00007fe3a0b14c90 RCX: 0000000000459a59 [ 616.945699] RDX: 0000000000000018 RSI: 00000000200000c0 RDI: 0000000000000003 [ 616.952971] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 616.960250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe3a0b156d4 [ 616.967532] R13: 00000000004c9fc5 R14: 00000000004e1c58 R15: 0000000000000004 [ 616.981774] EXT4-fs (sda1): re-mounted. Opts: 03:37:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:29 executing program 3 (fault-call:1 fault-nth:5): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r1 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x2, 0x200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff05899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) [ 617.321661] CPU: 0 PID: 22017 Comm: syz-executor.3 Not tainted 4.19.78 #0 [ 617.328636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.337996] Call Trace: [ 617.340600] dump_stack+0x172/0x1f0 [ 617.344248] should_fail.cold+0xa/0x1b [ 617.348147] ? mark_held_locks+0x100/0x100 [ 617.352392] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 617.357505] ? find_held_lock+0x35/0x130 [ 617.361582] __should_failslab+0x121/0x190 [ 617.365828] should_failslab+0x9/0x14 [ 617.369636] kmem_cache_alloc_node+0x56/0x710 [ 617.374140] ? lock_downgrade+0x880/0x880 [ 617.378300] create_task_io_context+0x33/0x450 [ 617.382896] generic_make_request_checks+0x1d39/0x24c0 [ 617.388194] ? trace_event_raw_event_block_rq_requeue+0x600/0x600 [ 617.394436] ? rcu_read_lock_sched_held+0x110/0x130 [ 617.404587] ? kmem_cache_alloc+0x32a/0x700 [ 617.408926] generic_make_request+0x24c/0x12d0 [ 617.413520] ? mempool_alloc+0x176/0x380 [ 617.417591] ? blk_get_request+0x710/0x710 [ 617.421842] ? mempool_destroy+0x40/0x40 [ 617.425910] ? lock_downgrade+0x880/0x880 [ 617.430077] submit_bio+0xba/0x480 [ 617.433625] ? submit_bio+0xba/0x480 [ 617.438655] ? bio_init+0x7e/0x140 [ 617.438673] ? generic_make_request+0x12d0/0x12d0 [ 617.438690] ? __lockdep_init_map+0x10c/0x5b0 [ 617.438704] ? bio_alloc_bioset+0x2f2/0x690 [ 617.438720] ? __lockdep_init_map+0x10c/0x5b0 [ 617.438740] submit_bio_wait+0x115/0x1c0 [ 617.438758] ? submit_bio_wait_endio+0x40/0x40 [ 617.460418] blkdev_issue_zeroout+0x202/0x4c0 [ 617.460438] ? __blkdev_issue_zeroout+0x1a0/0x1a0 [ 617.478483] ? create_page_buffers+0x390/0x390 [ 617.483067] ? __lock_is_held+0xb6/0x140 [ 617.487155] ext4_issue_zeroout+0xfe/0x170 [ 617.491401] ext4_map_blocks+0x1480/0x1b20 [ 617.495649] ? ext4_issue_zeroout+0x170/0x170 [ 617.500158] ? __might_sleep+0x95/0x190 [ 617.504145] ? ext4_journal_check_start+0x18d/0x220 [ 617.509179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 617.514721] ? __ext4_journal_start_sb+0x12d/0x490 [ 617.519659] ext4_iomap_begin+0x450/0xfd0 [ 617.523819] ? ext4_dio_get_block+0xc0/0xc0 [ 617.528155] ? mark_held_locks+0xb1/0x100 [ 617.532309] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 617.537415] ? current_time+0x6f/0x140 [ 617.541305] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 617.546419] ? lockdep_hardirqs_on+0x415/0x5d0 [ 617.551013] iomap_apply+0x106/0x2b0 [ 617.554733] ? dax_iomap_rw+0x360/0x360 [ 617.558717] ? iomap_dirty_actor+0x6c0/0x6c0 [ 617.563132] ? current_time+0xde/0x140 [ 617.567038] ? __lock_is_held+0xb6/0x140 [ 617.571118] dax_iomap_rw+0x212/0x360 [ 617.574927] ? dax_iomap_rw+0x360/0x360 [ 617.578921] ext4_file_write_iter+0xb5e/0x1060 [ 617.583528] ? mark_held_locks+0x100/0x100 [ 617.587775] ? kasan_check_read+0x11/0x20 [ 617.591935] ? ext4_file_mmap+0x410/0x410 [ 617.596097] ? mark_held_locks+0x100/0x100 [ 617.600344] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 617.605894] ? iov_iter_init+0xc6/0x1f0 [ 617.610317] __vfs_write+0x587/0x810 [ 617.614043] ? kernel_read+0x120/0x120 [ 617.617967] ? rcu_read_lock_sched_held+0x110/0x130 [ 617.623338] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 617.628104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 617.633651] ? __sb_start_write+0x1a9/0x360 [ 617.638004] vfs_write+0x20c/0x560 [ 617.641552] ksys_write+0x14f/0x2d0 [ 617.645187] ? __ia32_sys_read+0xb0/0xb0 [ 617.649258] ? do_syscall_64+0x26/0x620 [ 617.653238] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.658609] ? do_syscall_64+0x26/0x620 [ 617.662598] __x64_sys_write+0x73/0xb0 [ 617.666494] do_syscall_64+0xfd/0x620 [ 617.670307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.675505] RIP: 0033:0x459a59 [ 617.678710] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.697622] RSP: 002b:00007fe3a0b14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 617.705428] RAX: ffffffffffffffda RBX: 00007fe3a0b14c90 RCX: 0000000000459a59 [ 617.712700] RDX: 0000000000000018 RSI: 00000000200000c0 RDI: 0000000000000003 03:37:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) [ 617.719979] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 617.727343] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe3a0b156d4 [ 617.734623] R13: 00000000004c9fc5 R14: 00000000004e1c58 R15: 0000000000000004 [ 617.748339] EXT4-fs (sda1): re-mounted. Opts: 03:37:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) [ 618.120783] EXT4-fs (sda1): re-mounted. Opts: 03:37:30 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/.ro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff10899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) [ 618.429631] EXT4-fs (sda1): re-mounted. Opts: 03:37:30 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='//ro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) [ 618.478627] EXT4-fs (sda1): re-mounted. Opts: 03:37:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:31 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<\a\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939b87b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) [ 618.769545] EXT4-fs (sda1): re-mounted. Opts: [ 618.877026] EXT4-fs (sda1): re-mounted. Opts: 03:37:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:31 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4\xc0\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) [ 619.154374] EXT4-fs (sda1): re-mounted. Opts: 03:37:31 executing program 3: write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xa80, 0x40100) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)={r4, 0x38, "eecf48647450963adeef5ae082403e5b6948b8e035efb7520a965c37c873b30b1ce0deeabac940839533a0d14f607f5711af9a23c2e32320"}, &(0x7f0000000300)=0x40) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={r4, 0x8}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r5, 0xfda9, 0x4000}, 0xc) 03:37:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:31 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1a, 0x0, 0x0, 0x81, 0x0, 0x0, 0x41c1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) 03:37:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x6}, 0x28, 0x1) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7f, 0xe06fd3fe674f4331) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9d) ioctl$NBD_DISCONNECT(r1, 0xab08) 03:37:32 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\x06.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) [ 619.789951] EXT4-fs: 1 callbacks suppressed [ 619.789961] EXT4-fs (sda1): re-mounted. Opts: 03:37:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:32 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x102) 03:37:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x80000}) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x0, 0x7f}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000300)={r2, r4}) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) statx(r5, &(0x7f0000000080)='./file0\x00', 0x0, 0xfff, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000340)={0x80000000, 0x6}, 0xc) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:32 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\a9E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) [ 620.381142] EXT4-fs (sda1): re-mounted. Opts: 03:37:32 executing program 3: syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x3b, 0x200000) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x8800000) [ 620.487400] EXT4-fs (sda1): re-mounted. Opts: 03:37:32 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\a\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x200000000, 0x1a8101) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000140)={0x7, 0x0, [{0x3ff0000, 0x0, 0x7f}, {0x85, 0x0, 0x20}, {0x401, 0x0, 0x3}, {0x4, 0x0, 0x400}, {0xfd52, 0x0, 0x80}, {0x10000, 0x0, 0x2}, {0x5, 0x0, 0x6}]}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000000)={0x4, 0xffffffffffffffff}) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x1, 0x2, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x20000250) [ 620.771419] EXT4-fs (sda1): re-mounted. Opts: 03:37:33 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x02\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0xffffffff000) 03:37:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000001540)=ANY=[@ANYRES32=r5, @ANYBLOB="38000000eecf4864744b963adeef5ae082403e5b6948b8e035efb7520a965c37c873b30b1ce0deeabac940839533a0d14f607f5711af9a23c2e3232039ed1f3e654ce6aaadf4559ec0141406292b12dc13984db3ec58cad99ce6b0e4518295faed2a94f645421be02f04014e25cb6b97c6241b75e314a5c5e98870"], &(0x7f0000000300)=0x40) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={r5}, &(0x7f0000000100)=0x8) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000240)=""/75, 0x4b}], 0x2, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000000)) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f00000001c0)=0x5) 03:37:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x204002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x9}, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x7ff, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x600) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x60001, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='bridge_slave_0\x00', 0x10) 03:37:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:37:33 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x04\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x03\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x9, 0x4200) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0004000000000000abac3f2e55a101007665746800000000180002001400010000000000160e5f63354f7c92b85a76727277e763c4d88ff242868ed9daa79184285369427d602ef89c740ed8c91731f67720f260d12306879d79015d066b1cc880cbe6de9ea3ded778778651", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000006400070500"/20, @ANYRES32=r5, @ANYBLOB="0000ffff0000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xf, r5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x800, 0x0) ioctl$RTC_IRQP_SET(r6, 0x4008700c, 0x1c82) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x2761, 0x0) r1 = semget$private(0x0, 0x207, 0x0) semop(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x10) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000080)=""/165) r2 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0xfffffe37, 0xfa00, {0x5, 0x0, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, r2, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001700)=ANY=[@ANYBLOB="500000050000000000000025020104fd", @ANYRES32=r8, @ANYBLOB="08000200ac14143108000400ac1e0001140003006361696630000000000000000000000014000600050000000600000002000000d3060000"], 0x50}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r8, @ANYBLOB="fcff0400f1ffffff0000000008000100687662001c000200180002000300000000010000000000000800000000000000cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3400000064000705000000000000000000000200", @ANYRES32=r8, @ANYBLOB="0000ffff0000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000017c0)={'ipddp0\x00', r8}) sendmsg$FOU_CMD_GET(r0, &(0x7f00000018c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001880)={&(0x7f0000001800)={0x54, r2, 0x300, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_IFINDEX={0x8, 0xb, r9}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x44) r10 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) tkill(r2, 0x2d) timer_create(0x1, &(0x7f00000000c0)={0x0, 0x1c, 0x1, @thr={&(0x7f0000000280)="01f4c851266600f69691c48f88f20dc961557daafe44c14e3f759a2a8600193d1d6a4756e18eff41188a4a435cfe4b57976687995fc72c3a13c79d283f7f0bbdb79f2496ed927ab45857882a63e02395a7fdf3e1d026db878320ceb52da5d1b4c2f949099efb8b8b9ba2c1bf27a1bef249904468daf05a825c1db66d70a91c25edea1a0d4e6d81ddce7a2634f7a2ab033b890f8fc174d3515a87307cf5afb94b310c31dbf957ee22231da1aa742597293e6b6260c142dc157a7750f8d5f8d0e88322c979991a732e7b1e939246f02bde2c0ee26891b15ee60bdee6adb51ce7b903242995b09ea1c7f2120909a0", &(0x7f0000000040)="f5c4a86ab918b8dab8875f6038485b7a24c4c68fddd358d443e27a28fd85b7e4b35096a9564735b5967643b2e2e19e62c51e24ce15ab3ff8e1675c7326"}}, &(0x7f0000000100)=0x0) timer_settime(r3, 0x0, &(0x7f0000000380)={{}, {0x0, 0x1c9c380}}, &(0x7f00000003c0)) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:34 executing program 3: r0 = syz_open_dev$vcsn(0xffffffffffffffff, 0x0, 0x8e000) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x9) poll(&(0x7f0000000040)=[{r1, 0x401}], 0x1, 0x108) write$smack_current(r1, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='net/ipx\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x13d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000900)={0x14, 0x88, 0xfa00, {r4, 0x10, 0x0, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x90) preadv(r3, &(0x7f00000017c0), 0x1a4, 0x0) ioctl$IMCLEAR_L2(r3, 0x80044946, &(0x7f0000000040)=0x9) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000000)) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0xee00, 0xee00, 0xee00]) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x3ff, 0x2, &(0x7f0000000680)=[{&(0x7f0000000580)="993a3c5925f3a2be033703cdfe1df38c4c732c17c845257ddb81d87d3a456e1b277b150201361b38001a61cb6fa4fb2f2ee5ba", 0x33, 0x7}, {&(0x7f00000005c0)="e1f7265b8ed407769668cf990e91e0703be292a74bc4edab8d21f903deeb42a3426980cf17cf7d15bf9652451c0b2e1528bfd332e38176dd562c9278c137de03374c357152c98233575aa087cbf9ce5b0494ee8d860d40ce70cb440f4dbe89968b1368dea0bb4ead714468a0f9f54961de64a64de69efd222846f664e2fee13f4ef2492f26fa7471e4e65668e22aa8e680eb6b912d9200afee9ec07488ce006282be3ec3497fafa2c2e45bc62dedea3d82b2982638f747c75a486cad5db2cf", 0xbf, 0x9}], 0xc0, &(0x7f0000000700)={[{@gid={'gid', 0x3d, r6}}, {@part={'part', 0x3d, 0x8}}], [{@func={'func', 0x3d, 'PATH_CHECK'}}, {@dont_hash='dont_hash'}, {@fsname={'fsname', 0x3d, '(em1'}}, {@measure='measure'}, {@obj_role={'obj_role', 0x3d, '/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x31, 0x8a403db3fc2cda7a, 0x64, 0x64, 0x34, 0x34, 0x37], 0x2d, [0x64, 0x30, 0x30, 0x38], 0x2d, [0x34, 0x39, 0xad9c3dfcad30719f], 0x2d, [0x33, 0x32, 0x34, 0x34], 0x2d, [0x62, 0x33, 0x33, 0x3, 0x34, 0x34, 0x62, 0x33]}}}, {@euid_eq={'euid', 0x3d, r8}}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@dont_hash='dont_hash'}]}) ioctl$VIDIOC_S_PARM(r5, 0xc0cc5616, &(0x7f0000000280)={0x9, @output={0x1000, 0x1, {0x1, 0x9}, 0x4}}) 03:37:34 executing program 3: socketpair(0xa, 0x7df718053ec4d2ee, 0x30, &(0x7f0000000000)) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc8/\v\xb3\x9dS\bBV;\x7f\f\xaeEZ\x01\x9e\xbd\x95!\x9f\x01%Z@W\x83\x19SB\xc3*\xd0\x97Ts\xdeL\xa1\xf7\xee\xd9\x03\xbffs\xbb\x82q\xf1\x14q\xca\xff\x95\xe8BA\xed)\x0f\xebx\x13\xfc\xb9\x97\xce\xd6\xbc;.VK\xe3)\x13%\xb4S\xa8K\x8a\xc6\xca\\\xf7\xf1N', 0x2761, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000080)=0xe8) write$smack_current(r1, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0xffa0) 03:37:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ubifs\x00', 0x8000, &(0x7f0000000100)='\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x7a1d, 0x2608, 0xdd8, 0x31, 0x3fee}, &(0x7f0000000040)=0x14) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x86001, 0x0) ioctl$USBDEVFS_REAPURB(r3, 0x4008550c, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)={r2, 0x5f, "025d407d082e40f0dba062ca854bfcbc364a24374bb1bc1ddf09e6f4400d5c849ccf761c3c32f695ff241376a36863984aea8e5f3d786bd6fdd48004307f1b2ac473d225bbc43a8f199dab69f84582e59355e360364e2a95eddfff56816b10"}, &(0x7f0000000280)=0x67) [ 622.566248] EXT4-fs (sda1): re-mounted. Opts: 03:37:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:35 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x02\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1e) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87r6}) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) sendmsg$netlink(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)=[{&(0x7f0000000100)={0x118, 0x21, 0x300, 0x70bd2c, 0x25dfdbfc, "", [@nested={0x18, 0x27, [@typed={0x14, 0x7d, @ipv6=@remote}]}, @generic="61dbfbef8a03ca0ccf25a78542e9f827deea4d77840213546b7e945bf02b9842f4afd3566c2d1d240fe46a9642793aad73ed08eb", @typed={0xc, 0x27, @u64=0x12a}, @generic="1594e4cd230b6b0723b88e87b850390d66d32ccfc8ccf9fd561b90eb17f742a74c98d1f83ca067330f1061a1bda59051ff534784f18fa12ec8e29f55358bb05ad606d14b4e131ed8e2838fbe60a02530946795b5cd799a718f5572dcb0399a7c49ded384ad4f60231f300582573a6fe8bb2d4b11b6472f9da7040499cf00c7725793d686e7023e5d0148996aa179c7e6bf92b57827b39fb9086dd4e82d688f349d128fe473", @typed={0x8, 0x88, @u32=0xff}]}, 0x118}, {&(0x7f0000000040)={0x80, 0x37, 0x200, 0x868, 0x25dfdbfe, "", [@typed={0x8, 0x2b, @u32=0x8}, @typed={0x14, 0x11, @ipv6=@local}, @typed={0x54, 0xa, @binary="5a34fec3c8e335835145cc1edcdade491cccbd5a3951046592b4e00c038f05aaea549a518e7d8686ab8f1f1693b656d6446925dab3217a7d52956692fdd35b513e5603492ae6377d964776c60b603b"}]}, 0x80}, {&(0x7f0000000240)={0x20, 0x10, 0x10, 0x70bd28, 0x25dfdbfb, "", [@generic="e1ab", @generic="8a7a410296ac0459e68bc7"]}, 0x20}, {&(0x7f0000000500)={0x474, 0x37, 0x300, 0x70bd27, 0x25dfdbfe, "", [@nested={0x1b8, 0x5a, [@typed={0x8c, 0x31, @binary="5211841c67ed306d9f80e680ba687900cb87352c76aac9bc615713692dba9cd413b134acefdb3509eb6c662ccb1c98c030ae982a94ef19e2bf26d2a941bd6fe2291268f80a90f728656092f94896a579b9b43a1692fbda632ae86c90f52189ef69d8dd6505cf85a7a819cc65e113299ce202bf93ed5dba92cb5a7b1408bd3fc019e5e96db11f"}, @generic="eaea2284f3697909454963f4b70008539ae98e7ab5c18383886184b453de047923dd6fe068c21f69f37e7e8921dac732a2e2fab4433451faacce40b1e635081bdafccf56e19bb2a3c18172bd8a52643769a9ea378a1b6c723546e1323355ea62cf0dcf0a38d18b9173b701bb8fa2f0c68eee6ad5d7a620317ec58eb2d377103627ed21aef8d2120aff61e540871e36f0f7bb55687596c41181cf64c91eaecd553158dbdb854d735bfab37209f124cf748de62d128baf4d39586138e49c5dedcbed8e61deded0ffc79d8a3f6b7e10e9", @generic="4071e4ab2b70abc7c7063b82bf23b49a89424c3c54c507fc9f9b90c0beafe912e4a76f242de495ac908ae9e4d69e19af8a0d12b38a9f9c4f89c92a94ce208f72530ef3181c98a562cd72dbf062a298ed38e9", @typed={0x4, 0x77}]}, @generic='\'', @nested={0x18, 0x5a, [@typed={0x8, 0x6d, @pid=r2}, @typed={0xc, 0x64, @u64=0x2}]}, @nested={0x18c, 0x69, [@generic="586cc37779aa1bf5c20a60fd44d4a1fea4f5b523f4398d828835cbccfa018a22773256a92a033b15c3d581248fa357f41589dc26431dcb3a49dd461d8d63da7a51853ad7142a474f74e1baa695ca73173edd60916bf9521eb931296d9d075f9a2c99a55b81f6d4a1521e3c551e6422104cbaf22c9cecb06af0300ca9eae577b2a6d83e71cff7e316371ec743df214f05f9b3ec7bd19a", @generic="16de01402f54db7cbf4080a4cca4fc70c3f0487cf5", @typed={0x8, 0x95, @u32=0x1}, @generic="d0d2bbf5c84c3e1a4a0f29e35a729e1d5d29cdc4b35ba1c816aebae33ab649081f184ee541cad0cd4146d5b14a23c9f76ccae5e374dac3d63685f4b6c77d3a10bbaf2731b7c55a447f4b9940b1ea1112eef7dc2116567e233ed331ebc8c0643d957c227ed6febb6b306582e90f014cfc36f0b8e43cde321f1512932b63c04246187588466778a75434e43415d138f9d510c133b76d2cff8c165c43ebf378215be7cf4098ef345bc0e10d24070013be38dd5fbb4b79d3922dfb8e74cd3427306f217132fa794bd2dca8254699813faef6f881"]}, @typed={0x8, 0xb, @pid=r3}, @typed={0x58, 0x6c, @binary="bf22221e164da97d934b14b710e47a27098c26c620f8203b08f648e00c47cb19a0d802f975ae8746de11b70d3f046037c3bf481113dcbb479bfbb3269e2e2173bb19522c46d15e03cc2be67d01035d2923d8"}, @generic="8b79394da0b2f11d424ba58e01984c4485250639f7e7106b2d233f7e2601c1156b09ca55cdaaa6b156a33be86cd413e1fc86ee0be785c8b08f224833bbb2d97ace2096ac058693d1063fee6baafafb6cd61ff3a286aa1312fc8ccf979e9acc4fcd9493399ccd612b424159c0e5e0f58d2d7cfb764cc9262f8977", @generic="d6af22d2f1f41b6dd220eda2195388c772e0cbb97c87084fadc825c85a1ea20aef140e45abe41a690ed088"]}, 0x474}, {&(0x7f0000000980)={0x348, 0x23, 0x10, 0x70bd28, 0x25dfdbff, "", [@nested={0xc, 0x4d, [@typed={0x8, 0x66, @ipv4=@dev={0xac, 0x14, 0x14, 0x13}}]}, @generic="57f7e6f694af3ca65811e23d4145940dca9cfe3adec73fd4a15e9f16b921e85bd6b24ed6f1190a75516da9a41cc6f0e82d5ed34ea307c136d3245b674b4a0e8eaa3b813329ea8228281c778d5afd17bcbf2d9ecb6e5c50dcc011f3d407736b0101dd32949d0c4427e2c4ca1f856c5ed82064dbea0a3df4800b5fef553e40c1514f93f7ff55d76aef1a38d9156580b0b1d806b68b6037661474d5cf617e25efb5776725483a41e27524d90530dd6d7188013244bffef7f10c3c03670ac3ab5dc05fa0ee956bc9dcab3d90c6f0d28790ebdc413747a508ee1b", @generic="478f5ce83217", @nested={0x214, 0xb, [@generic="e4a59395225ae077b274311a0b95df6c201a9a084e93d9541ef48274ecaac3e970d23442b6949cb959f94c4a095913ca3924909649d440b778fbf60e276080c135d06f92d969fd638e02fe859d5af9d06a3dbf112336541c2fb04f8c4f74fd5d61c1f895d4894c384168efe260ecdcc09f6dd9d2045b2852f10d8b714f7b2a4600", @generic="04ce0919119e10a151059c924800f7d7126e048ddc27803f269a6087a183c5e657888bde10c0048d2e995edad67aecb97b2dd36032118d0a505c41a375602275a4824faa11ead104bd5895b80a573c921eae37cb52cffe30faa7ad62062f827cb4022699a87dc6687bd52f61bd2255257e15de05a9d14b2f759c4ee73c1d8a642d8e88c33ed46dc423f5d7b8310777848a3ec8b2979f174a6d935d524cecd4169057e2871d44bddc938eb4b2fd7e17df27d0fdaa8ae21a035a46f20e4dfc887012d54dccf4286e96e6", @generic="7c7d4e9e0f7af228cf69562fa6593f91498e074d7eb10a09b7b3cfcb72796bace40d9a4f8cbb7fe0e87d0e48f442291d06347ba46f0295071930e12dcfef92e367e8a91b7c53a5fa331c14620efbaab95939e82536e5bda8959d5d53648102acd1b0127021d8bcb4c992e92daaa626b8d8ed37abe71af942bd82ed4d1b44304917e0612353d716ecb75512b4c988781b2468305cf7f9984208464f0990e9fdeca2c780d110ab027b70126ce1a154ea94e26dd42d2b35a13e3c10e5bf0444fecc0d2bd3"]}, @nested={0x38, 0x5, [@generic="25b425a29078b6cffdc6a988ac534dd49e21feaaad33b67fec4d51f9f0fb6c597f873a8e6af4215f18", @typed={0x8, 0x23, @fd=r0}]}]}, 0x348}], 0x5, &(0x7f0000000380)=[@rights={{0x1c, 0x1, 0x1, [r4, r7, r8]}}], 0x20, 0x4c014}, 0x4000) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:35 executing program 3: syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x392, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x10000, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x50, 0x80000) openat$cgroup_ro(r0, &(0x7f0000000480)='cpu.stat\x00', 0x2761, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x5) 03:37:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) mount$9p_virtio(&(0x7f0000000040)='\\\'eth1,wlan0!\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1200020, &(0x7f0000000100)={'trans=virtio,', {[{@privport='privport'}, {@uname={'uname'}}, {@dfltuid={'dfltuid', 0x3d, r0}}, {@loose='loose'}, {@access_any='access=any'}, {@uname={'uname', 0x3d, 'GPL'}}, {@debug={'debug', 0x3d, 0xc77}}, {@access_uid={'access', 0x3d, r2}}, {@fscache='fscache'}, {@access_user='access=user'}], [{@obj_user={'obj_user'}}]}}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:35 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x03\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ff7000/0x9000)=nil, 0x9000}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) r1 = syz_open_procfs(0x0, &(0x7f0000000800)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xe0\xc1\vo\x93\xb2L\xfb\xc3xY\xaf\x0e\x82\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?[{8\x17\x17\x81\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r2 = dup2(r0, r1) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}, @in={0x2, 0x0, @remote}], 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}], 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000200)={r5, 0x38, "eecf48647450963adeef5ae082403e5b6948b8e035efb7520a965c37c873b30b1ce0deeabac940839533a0d14f607f5711af9a23c2e32320"}, &(0x7f0000000300)=0x40) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r5, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x97da, 0x3fe0}, 0x90) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xa9\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x8b\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:35 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x04\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0xab730a6eb8ce68ff, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000280)={0x9, 0xffffffffffffff48, 0xfa00, {r3, 0x0, 'oZn', "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"}}, 0x110) [ 623.412552] EXT4-fs (sda1): re-mounted. Opts: 03:37:35 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00kkk\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x4498b252997e6439}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:36 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4803b85300b800800000000000003500001e0000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000006400070500"/20, @ANYRES32=r6, @ANYBLOB="0000ffff0000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xe, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, [@map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20}, @alu={0xb4227dd71472d3ed, 0x0, 0x5, 0x7, 0x1, 0xffffffffffffffba, 0xffffffffffffffff}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @exit, @alu={0x4, 0x0, 0xc18226cbb03f8eb4, 0x4, 0x9, 0x80, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0xfffffffd, 0xc2, &(0x7f0000000280)=""/194, 0x41000, 0x1, [], r6, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x0, 0x120, 0x7}, 0x10}, 0x70) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:36 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\xff\xff\xff\xfe\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) [ 624.291679] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47104 sclass=netlink_route_socket pig=22486 comm=syz-executor.0 03:37:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[]}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', r6}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) sendmsg$can_bcm(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, r7}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x44, 0x8, {0x0, 0x7530}, {r8, r9/1000+10000}, {0x0, 0x1, 0x0, 0x1}, 0x1, @canfd={{0x2}, 0x3a, 0x0, 0x0, 0x0, "e2b17381f94eacbe9f1775d789b2d87bcbf6a882138ca09051157e552446aa5da8a5c836a8e05967df0534a2b4e54714aba29afebcd33b987c15021c437a5303"}}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x20) fcntl$setsig(r0, 0xa, 0xb) 03:37:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) [ 624.400193] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47104 sclass=netlink_route_socket pig=22493 comm=syz-executor.0 03:37:36 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\xf6\xff\xff\xff\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f0000000040)='!et\xb4\xb1\xa5h0md5sum:self$vmnet1\x00', 0x1b) [ 624.626943] EXT4-fs (sda1): re-mounted. Opts: 03:37:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) write$cgroup_pid(r0, &(0x7f0000000280)=r1, 0x12) r2 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000050000000000000000000000ffffffff010000001900000000000000000076657461315f746f5f0400000000000065727370626e300000000000000000006272696466655f736c6176655f31000069653e841901e50ac9000000000000000180c2000000000000000000aaaabfaaaa000000000000000000d4000000d40000001c010000636c757374e57200000000000000002000000000000000000000000000000000000000000000008e8300000000000000000000007265616c6d0000000000000000000000000000000000000000008000000000000c0000000000000000000000000000006c6f67000000000000000000000000000000000000000000000000000000000024000000004608fdc2eedaf8ff6fcbc6a67ee31e6bfa4cf9f0761ffdac96c7d300bc1d000000000000000000000000000000080000000000000000000000000000000000000000000000000001000000feffffff00000000"]}, 0x224) getpeername(r3, &(0x7f0000000000)=@nfc_llcp, &(0x7f00000000c0)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000000)=0x2) 03:37:37 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x03\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgr\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2761, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x16d643, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x1000000}, 0xc) write$smack_current(r1, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) connect$unix(r0, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x6e) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) ioctl$FICLONE(r2, 0x40049409, r1) 03:37:38 executing program 0: setxattr$security_selinux(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:devtty_t:s0\x00', 0x1e, 0x1) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x100) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000100), r4, 0x0, 0x2, 0x4}}, 0x20) ioctl$sock_ifreq(r2, 0x89b1, &(0x7f0000000040)={'syz_tun\x00', @ifru_map={0xffffffff, 0x6, 0x9, 0x7, 0x4, 0x40}}) 03:37:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0xe71b20a0735bca5d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:38 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x04\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) [ 625.950047] EXT4-fs (sda1): re-mounted. Opts: [ 626.022183] EXT4-fs (sda1): re-mounted. Opts: 03:37:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x2000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:38 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x03\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 03:37:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001401, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000000)={0x6, 0x8}) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) [ 626.281227] EXT4-fs (sda1): re-mounted. Opts: [ 626.343450] EXT4-fs (sda1): re-mounted. Opts: 03:37:38 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00kkk\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x8000, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x80000001) write$cgroup_int(r1, &(0x7f0000000080)=0x8, 0x12) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f00000000c0)=""/149) write$smack_current(r0, &(0x7f0000000000)='!eth0md5sum:se\x97\xa7\x8cO\x12\x155#\xf4\xd1\x19\rlf$vmnet1\x00', 0x24) 03:37:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x26801, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, 'memory'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'cpu'}, {0x2b, 'io'}, {0x0, 'rdma'}]}, 0x2b) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f00000000c0)={{0x1, 0x0, @identifier="bf932547c80017859ec6876d61752028"}}) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1e) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x1e) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) r10 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0xfc00, 0x2080) ioctl$MON_IOCQ_RING_SIZE(r10, 0x9205) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r11}], {}, [{0x8, 0xd, r12}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) sendmsg$netlink(r0, &(0x7f0000000440)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfb, 0x8000}, 0xc, &(0x7f00000000c0)=[{&(0x7f0000000800)={0x34c, 0x22, 0x8, 0x70bd26, 0x25dfdbfc, "", [@generic="59c67789ebbe04f9c05b7fae52168c25131867fef0a9fdd9bc4e882c3ebeac", @generic="e83ad2c613673bd5cebc3df9de2e957033200d3efdc33aea8f5d9fb3921f5ec01eb3bfac479b8f4fb683f27378bba0e7f739", @nested={0x64, 0xf, [@generic="b181508f2cf0186a2f8591dba3182030549bc60f7bcf292a467d1d28837f64a832691238773227e2c8cfaa4233dac300aa7d81e7e76abc5111956bed3a93e68a5b9727fd239ba05963b1c9b4cf06e965b30f2409853e6c5923e34bcdf7fe"]}, @typed={0xfc, 0x53, @binary="dc82c1faaad698bdc84223251cf3f8b0d5702870ff79afff0b8fab187a127808cec4d5cc81ff29213602729774c5aa05a39ce2b00a38b7776a609a1a826adce35569889831c8a786670eb58174dcd05d6e336f27c9c7669f430e32ebff52104d3a177ffc929543028920ac86c8726ec2e84283bd8ceb2529bb167447616ed2b2455033855bd07e97957e265dd181702aaec57b6f5da29aac6437be3b45be82a622a66e9900a9c7668635dbd59732b7d79eac8e004a486cfb22c60e57a0526657d9e460fedb6f9d3e641c641c46bfc27f38169f7ac6d1a383da033075b9ca0730205f937d1fcf7d7a4d6d1eac0a1e8ee2827510b966"}, @generic="535583f32d9de2e551a8242d6b5fdbdbb5fe66f147d3c42e227bc04722e6a9855dbf5049c8ef4133a9cafe1b164a473fd50106ee80968d74b4450146cf42afc97788215cbe21b2fc60140b89995319", @nested={0x54, 0x82, [@generic="b4220857d5714c94909dc4e9dc50fa5a8af165f67b37a74e2121ae7757ec7ae1f0271db2215ff766de07f3b7202b6c14c2aa7ff566cf032aaa083e", @typed={0xc, 0x3a, @u64=0x2}, @typed={0x8, 0x34, @pid=r2}]}, @typed={0x8, 0x59, @fd=r3}, @generic="c1a9940e5e0ffeb64e415786f9cf7f0bbfde40b88b4d339f5e54c23f0204f60bf99a6dbc095874900d64eb4b6c2df5442f1384ecf734579c19ef50f256542cdd7c3c5c07dd6290caa29e34f189bc4afc5b63bad8871e51f0755aa2ed175194468f334bb1d12c40484d0c6ec6df508f3844621114ea4d2aed28df099a77dfc841e57dc092f71c077faf99b0c0b5c40ffffd4149966901872e15343c6d4463535f1f27239b6667214361ebfb977b03bbec573560", @nested={0x18, 0x55, [@typed={0x8, 0x14, @ipv4=@empty}, @generic="d1eaf0d24657f834df"]}, @typed={0x14, 0x5d, @ipv6=@loopback}]}, 0x34c}, {&(0x7f0000000b80)={0x198c, 0x2e, 0x100, 0x70bd2d, 0x25dfdbfd, "", [@generic="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", @typed={0xc, 0x75, @u64=0x7}, @nested={0x118c, 0x8, [@typed={0x4, 0x32}, @generic="eb70bd6cbb002daf8b26ab1e1937d5a3a194b160fe1a9c90076a667c1f351c0213d2485f69e3edf73f4b953afe70bc31fd3ed7e55549bc1559ede08a3c571781b1578293e9749c51", @generic="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", @generic="e475e6ca195e5e224a947e4bd8f0eda514003d344ce404cbd611f595f3c2ba1098d204051e228236caa8a993bce1e1f0", @typed={0x1004, 0x78, @binary="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"}, @typed={0x8, 0x6d, @fd=r4}]}, @nested={0x200, 0x14, [@typed={0x6c, 0x65, @str='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4'}, @typed={0x14, 0x7d, @ipv6=@dev={0xfe, 0x80, [], 0x12}}, @generic="8728508ae306d65c461e7a721d1b7ff26a649cd88feaa3b37174f17212a1f0806d56f709ef3e8dac08228da70e5c0513eed28ac60eead0e9f8f943bdb7ad8b82af6be96ea03f05bfee0afe0a14140d2767038851486f829f28f1eb8e3b0b683141fcaae6c325733562b74e6b503ba1345aaacb98515f24e64fa902c6992bc47e7def1809b4be5cb5c9d11a1ccfe60fe79f", @typed={0x8, 0x8, @u32=0x1}, @typed={0x8, 0x9, @fd=r0}, @generic="dc086e881b7b30f8f104fc6785c86954c8fb3b667fd73cb56d23a519e234b0f715c420683f3df3c9", @generic="0e59b947d4571a4a2cf6539f3138e945c7dcd3a969cdc4ed0f76776148f08873c7f85355d7bf54bac290b28e0753fdd80e4e6f13acf45ee7107d4c124fe3635f84785a0584e4b831c76ab828e9f20c3a6130a8b0aae65c05ceb11986362d6466f963431e56ae08d3c07e05b04c60fb835f06b2f991b4433f22ed55e09bb0ed7c192988bcc8690531030d4f7e8920201b5702b5b8dba9070561494219deac00369c81c5bc73", @typed={0xc, 0x72, @u64=0x8000}]}, @typed={0x8, 0x13, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="c3ffd875d257af2cdf99a70f92e2fbe9317c3c82aab64fceb80513052209a2c619d3b5152dc2e0d69febd4dea714955216cd9ed2b33b3febc30c6ce076814c7ea142a7027d9595a47294783708ba1320110d1b58f6eec9d8fb6da34e6e6fe34951080f71108171b1bb3ca621374ec28b64dbe453da171ba53669aa5574569ae6f856d02d8d36612eb9f04dfed49377253d3ba904e639eb61a31d3ac77d7176ed1a84498fe9c4c6e4fac9d471a46f837f9614e62e038374ba199b690ccf52b9cb6c6e848e24955854a9e5748140f19cc2109bc558adc2cbe794b16a6cd0c1ec0906498b534f83828e43992cd7", @nested={0x3f0, 0x92, [@typed={0x24, 0x19, @binary="9543a41928a22ac6a4d0293a014128c0b63e55f540d520b81ad5a014fb5e5e"}, @typed={0x8, 0x8b, @fd=r5}, @generic="13b915a09099f2043a56bb20e06948fbe939d6559ebfaf6e8e54bff804725e8b0ec237c7f3fc659a98ababfd67073962b8d0235274acfb563dbbb5c411a3934a9206b7c510add584dab4056f0594c8fa3986e7ced7346273cc713f476fd6a26fd83402839e68eea6aef9aaa7e67463990de6c3c92b594f", @typed={0x14, 0x7c, @ipv6=@dev={0xfe, 0x80, [], 0x1c}}, @typed={0x2ac, 0x41, @str='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3'}, @generic="b50827e97baf3278d40df96e2c01f73354932b048b455b8fa9e5ef556cdac99e7dba4de8e8a0dbcdd53003dc0763dc0ee5a7cac35c6171fd0f2753f5cc7fb3318fa77f9a59ba136aaa48ed324047ee7e170e7109062a71278cf5209342e4092b94f4109b0187bccf213e1062e9fa13693324797161124874eb26bf8873f04593ef516a6a61044a845c"]}]}, 0x198c}, {&(0x7f0000000280)={0xb0, 0x32, 0x300, 0x70bd2d, 0x25dfdbff, "", [@generic="1c0c0b1c498a181f5a0f1c548d306ad31dbbc294af7ffcc10531ceca4a2feab9809ce0e4b4142eb1751537908dda6dbe003db574e7ebf5294027d99a93ab9b291b4f3c549b13d1146783bfa85c1bdc7004cb2e02e3037221c20e419fbe83147054fa1f1b98648b6657ee5718688e9381fd492764e6cbeff56476c1f14ba272b8c3b8f546e2eda5006369df90a5ef3a379795f5368072f9a48c1b2f92a7"]}, 0xb0}, {&(0x7f0000002540)={0x11e4, 0x30, 0x500, 0x70bd29, 0x25dfdbfd, "", [@nested={0x7c, 0x85, [@generic="7be795fb72ad0c687b05013c3f898cea88e7b95df49fb68c34057c73285e9b94e42c91569c0a93bbc276f97237149fcf6cc26b5b3a7168fefff586478cc225e6d876eb3144cf4ad348b8f7019a83667b919d94ce7baa501096b30a6c24856a1053027b861aba0ab3ed60e4a38b", @typed={0x8, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x23}}]}, @nested={0x14, 0x55, [@generic="bdc17a5d202c7f044e5d34baa91420f6"]}, @typed={0x8, 0x33, @uid=r6}, @generic="0a25bb9bf388e61c5dc5dc0aac18ff501a90a73c218c833e0533e2632078b10c469b7a3444571c12b260793882f0b17c4cc388a3d219db9eff835078a0541c2c96384235edd3b484c6ecdcebdd858559ded0c50da0c43a511898d87a11e87660adccff9ceafee7980e0c53c01e6abdc4acfb0e8119affe8e757f89dc528139da856b7b3d3f11f6f8b88bee7d55722a93e996e28e4ae1b6f9b5fb932dc95d3c7bdd7073fb96aef07cc35457ee9a95a3850574d6868ab594b00643486b563ec04dd467eb5b108653f2ad662efdce444299373fbb670c2e30af6e9a5297900ce28d2c114e", @nested={0x1058, 0x3a, [@generic="c51133268fe708451933e8ba3118b1d5005b48a2c56efea7d9e20a475c93aa7fbda5b966371da43658b160f0dbc07f830fc3ecc21892914e6c0816e6d5423ac04de659fd49b5ab1632cdf8ddc4e9489fd3", @generic="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"]}]}, 0x11e4}], 0x4, &(0x7f0000000100)=[@cred={{0x1c, 0x1, 0x2, {r7, r9, r12}}}], 0x20, 0x4100}, 0x4000000) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) 03:37:39 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x01\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:39 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x520000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = open(&(0x7f0000000380)='./file0\x00', 0x40002, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x7fffffff) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000740)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100028bd7000ffdbdf250a00000100080009005c000000080004004e22000000000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x800}, 0x40050) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='/\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x4}, 0x1) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:39 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r3, 0xc0044306, &(0x7f00000003c0)=0xffff) r4 = shmget(0x0, 0x1000, 0x1, &(0x7f0000ff8000/0x1000)=nil) shmat(r4, &(0x7f0000ff5000/0x9000)=nil, 0xa000) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000280)=""/153) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x39d) ioctl$sock_SIOCBRDELBR(r5, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000000)={0x66, 0x1000, 0x4, 0x162, 0x15, 0x3, 0x3, 0x0, 0x5, 0x9, 0x9, 0x80000001}) 03:37:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000050000000000000000000000ffffffff010000001900000000000000000076657461315f746f5f0400000000000065727370626e300000000000000000006272696466655f736c6176655f31000069653e841901e50ac9000000000000000180c2000000000000000000aaaabfaaaa000000000000000000d4000000d40000001c010000636c757374e57200000000000000002000000000000000000000000000000000000000000000008e8300000000000000000000007265616c6d0000000000000000000000000000000000000000008000000000000c0000000000000000000000000000006c6f67000000000000000000000000000000000000000000000000000000000024000000004608fdc2eedaf8ff6fcbc6a67ee31e6bfa4cf9f0761ffdac96c7d300bc1d000000000000000000000000000000080000000000000000000000000000000000000000000000000001000000feffffff00000000"]}, 0x224) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:39 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x03\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0xb3, 0x202000) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f00000002c0)={0x7, 0x32435750, 0x7, 0x9, 0x1, @stepwise={{0x4, 0x8000}, {0x2037, 0x1000}, {0x8, 0xbe80}}}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000340)=0x10010011) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r6, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r7, r5}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r7, 0x1, "0f7d08", "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"}}, 0xfffffffffffffdff) 03:37:39 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x4, 0x14000) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)=r1) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='pids.current\x00', 0x2761, 0x0) write$smack_current(r2, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000040)={0x7}) 03:37:39 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x04\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x440, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000080)="144cab9658a940e13e1352d83ef7b1b7", 0x10) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x38) write$P9_RAUTH(r0, &(0x7f0000000000)={0x1, 0x67, 0x1, {0x80, 0x1, 0x3}}, 0x14) 03:37:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r4, 0x20}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f0000000040)={0x0, 0x400, 0x2, [], &(0x7f0000000000)=0x5}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) 03:37:40 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00kkk\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r2, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:40 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\xff\xff\xff\xf6\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\xb7\x00\x00\x00&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000080)=0x44) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000050000000000000000000000ffffffff010000001900000000000000000076657461315f746f5f0400000000000065727370626e300000000000000000006272696466655f736c6176655f31000069653e841901e50ac9000000000000000180c2000000000000000000aaaabfaaaa000000000000000000d4000000d40000001c010000636c757374e57200000000000000002000000000000000000000000000000000000000000000008e8300000000000000000000007265616c6d0000000000000000000000000000000000000000008000000000000c0000000000000000000000000000006c6f67000000000000000000000000000000000000000000000000000000000024000000004608fdc2eedaf8ff6fcbc6a67ee31e6bfa4cf9f0761ffdac96c7d300bc1d000000000000000000000000000000080000000000000000000000000000000000000000000000000001000000feffffff00000000"]}, 0x224) fcntl$setpipe(r1, 0x407, 0x80000000) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0x80000000, 0x8, 0x6, 0x1f}]}) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000006400070500"/20, @ANYRES32=r6, @ANYBLOB="0000ffff0000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0xa28c, 0x3, 0x81, 0x80, 0xffffffffffffffff, 0xbea, [], r6, 0xffffffffffffffff, 0x2, 0x3}, 0x3c) write(r7, &(0x7f0000000280)="f061720f8c94fa398b51355fedbccfddc9b36962f8c95547e821d8032ccda13788fa95f46ccc579c2c586eaf0dda00ad263d20478a583c37771dc9f5e1fc58347414ea3e86798be4f50c93da6b1dd111e39d9330253050eeed8fa3a81dff240cff04a1a9e822b27e8f7aee7155653fa5d42effa6a2feb4aa3f37a7e6a9c1d1dbeaaf16932520f78c2d3c5eda3129d90e6888a8ca4695d8f66b23778346a0c464e298db446f108d3f60954000c8ae0893580979c96287fd19028e7a89bcf4cfc4f968f8b778c18cc20cba66a1e0a9704aa524ba3c6c37426a6b4da39fb81b5c0ef9dcaa", 0xe3) 03:37:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r0}], {}, [{0x8, 0xd, r1}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x9, &(0x7f0000001640)=[{&(0x7f0000000240)="3a04a10988a15234d932ab5eae08aff4e663299e56d2d48e152e365ddc866282ce4dca7954df0d55841131a873b286f1c70d4c092bc2788d1851c1a15feb3be120970aafba6196ce01460a7ba52924e35c6f94911652db6210dd10b6ec5893539b9006b49738eed8ac848f725fa7cdea6e67d461a929083fd002c1a78dadb690f839b5", 0x83, 0x7f}, {&(0x7f0000000140)="a3840524a8467fa10ca84c62d12c990a9491973853b8947f38389970a7e40aabc2ac6d22c231f0cf5d8f1d", 0x2b, 0x6}, {&(0x7f0000000300)="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", 0x1000, 0x20}, {&(0x7f0000001300)="46d8c785663e13f1032afc9c52a95b7cc3b6144f13bbeae9f59a57f9591dfa68a92720d5110c7398266f8e4ee7d445e946578daa0237a280b8f390c81788abbd83ab044d8d1875c443bc4b6867e62dea177b2e79718823aafa865e20424459cc70accac4d5c30bcbcf0c88da6cc6bc389b88a15f31ff4865028b2c81239541ab93ece9568f89139fccf023c3abfe1e6735a808c61667a9057b74ab8faf07692f1553c4397d9564a657", 0xa9, 0x75}, {&(0x7f00000013c0)="25fea678d966afb1a48745bf65ad5cba8f2cbf8cbc901446ef7e06c263564120b2a562087e310299cb0a012aa965626a46d6d20da89ae4cf29850ad23ff1925e7b3e544c961653b55e7de48c908a25921eb00b1de9a4c9f0335b498d4ca42dcded31616546d4e1f8d4e6b50d3c9438d28e323616254d149952029c78b30ac087e5478af4f372504aa2b719f00a6a4a35c49226d44a9df3b128ef4e9f69c41f1cbcffc95e69", 0xa5, 0x1}, {&(0x7f0000000180)="dd4b98e8a91e6fad9ebfcb9b79eeb17da7f11b373ba4", 0x16, 0x40}, {&(0x7f0000001480)="963e84e66ee65b697001cf646f44fd1cd3eac74521232cf9570ab73092fba3f934e49eb4ebdde3c42a5a27ec9621f36dd36356c4c45df548382d7d4e759f84f1ad3c2b5efbbe8f06f2fbc0bd759a4be6791e06ff403fbd2cc851f3e04d901136", 0x60, 0x1000}, {&(0x7f0000001500)="3ed21038ebacb01548a83a3255919acc918f3b53ec9554ba1bed8b8bd33cd5379079fdc3c597126095f111f2ee6cdb47eb2cd4c15d2bbb3f779c27b3e9bc1508b633b5bf4386b396b0a0f2be5886c3e60cfeacf35b80dd5dfbfdf737155fb4ab094d3b85e3347ec1bab02a581f660c3ff9944348069140c948af9ce7a1223ddd506d895d21cc2b4493a102ac37bdda5996935a2395d20cabe651193b0c4cb197ea78cc02e313fea58085dc7418e9930bf0bac2f4375b86c7916e724a6fb1446f1c4d737b", 0xc4, 0x2}, {&(0x7f0000001600)="e2644f6ce7d454ae4bb76438c69fd3028e8832b95404fd89d64f", 0x1a, 0x7}], 0xb5228ff02acea8fc, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB=',show_sys_files=yes,uid=', @ANYRESHEX=r3, @ANYBLOB=',fowner=', @ANYRESDEC=r4, @ANYBLOB=',uid=', @ANYRESDEC=r5, @ANYBLOB=',fowner>', @ANYRESDEC=r6, @ANYBLOB=',subj_role=em1lomd5sumeth0,measure,\x00']) r7 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) prctl$PR_GET_FP_MODE(0x2e) ioctl$UI_GET_VERSION(r7, 0x8004552d, &(0x7f0000000080)) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:41 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\xf6\xff\xff\xff\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000780)='user\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f00000006c0)="ff", 0x1, r0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="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", 0x1000, r0) keyctl$read(0xb, r1, &(0x7f0000001280)=""/96, 0x60) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x20014, &(0x7f0000000140)='/selinux/status\x00') syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) [ 628.927128] EXT4-fs (sda1): re-mounted. Opts: 03:37:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r1) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r2 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:41 executing program 3: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) r1 = syz_open_procfs(r0, &(0x7f0000000000)='auxv\x00') ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) process_vm_writev(r0, &(0x7f00000015c0)=[{&(0x7f0000000100)=""/155, 0x9b}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/170, 0xaa}, {&(0x7f0000000280)=""/208, 0xd0}, {&(0x7f0000000040)=""/105, 0x69}, {&(0x7f0000000380)=""/235, 0xeb}, {&(0x7f0000001500)=""/153, 0x99}], 0x7, &(0x7f0000003800)=[{&(0x7f0000001640)=""/73, 0x49}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/100, 0x64}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/175, 0xaf}], 0x5, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000050000000000000000000000ffffffff010000001900000000000000000076657461315f746f5f0400000000000065727370626e300000000000000000006272696466655f736c6176655f31000069653e841901e50ac9000000000000000180c2000000000000000000aaaabfaaaa000000000000000000d4000000d40000001c010000636c757374e57200000000000000002000000000000000000000000000000000000000000000008e8300000000000000000000007265616c6d0000000000000000000000000000000000000000008000000000000c0000000000000000000000000000006c6f67000000000000000000000000000000000000000000000000000000000024000000004608fdc2eedaf8ff6fcbc6a67ee31e6bfa4cf9f0761ffdac96c7d300bc1d000000000000000000000000000000080000000000000000000000000000000000000000000000000001000000feffffff00000000"]}, 0x224) r5 = dup3(r3, r4, 0x80000) ioctl$MON_IOCG_STATS(r5, 0x80089203, &(0x7f0000003880)) write$smack_current(r2, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x6, 0xfa00, {0x0, 0x0, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:41 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\xfe\xff\xff\xff\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87D\xf9Z\x0f\x1c\xe0\xe1\xcd\xc3\x04\xbb\xf2\x04 \xf6ygk\x85@#\xd3\xaa\xdd|\x06\x92\x038\xf1\xa0}\x9ej\xf0\'z\xca]\x7f\xc4\xa1\x80o+\xcf\xd8U,\xa8\xcf\xcalnF\xb1a\a\x85\xb9\x99\xb7\x84\x13\x8a\t\xa8\xa2\xea\xc30,\xac\xa6N&@J\x94\xbc6\x04\xe8\xf8<\x96\xba\xf9G\x985Kx\xb9r\xa32\xf0\xdaY\x9e\xd9\xf1\\\x7f\x15\xc3\xd1\xdc\xff\x00&K\xd0\xff\x17\xf0%f\xa6\x81#V\xc1D\xf4\x1b\xfd\xba\a#\xdf\xecua*\x00\x15\xf5k2C5\xec\xed\xcd\xba\xb5\xb6\xe5H\xeea\"*h\xa6\xd0xE\xf1/I) \xe1\xc7\xa6\xbb\xca\x1c\xa5a\xe3\xd3\xf8\xf2\xa6\xcc-\xc6\xae6\xdan\xd1\xf3\x9d\xc1\x97\x923\xea\x9b\xfb\xb2\x8f\xa6S\x1e=\x10\xa2\xd2\xd4k\x81\xf1\xcd\x8dmY\xc1@;\x82[=\x00'/582, 0x2761, 0x0) write$smack_current(r1, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x7, 0x10001}, r0, 0x0, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='io.stat\x00', 0x2761, 0x0) write$smack_current(r0, &(0x7f0000000000)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:42 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x04\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:42 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00kkk\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={r4, 0x38, "eecf48647450963adeef5ae082403e5b6948b8e035efb7520a965c37c873b30b1ce0deeabac940839533a0d14f607f5711af9a23c2e32320"}, &(0x7f0000000300)=0x40) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={r4, 0x7}, &(0x7f0000000080)=0x8) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x1a9a03, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x1e) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002800)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8) getresgid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)=0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x1e) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000029c0)={0x0, 0x0}, &(0x7f0000002a00)=0xc) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="0200000001000a000000000002000700", @ANYRES32=r12, @ANYBLOB="040000000000000008000d00", @ANYRES32=r13, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="10000000000010002000000000000000"], 0x4c, 0x0) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r14, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r15, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r16 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r17 = socket$inet_dccp(0x2, 0x6, 0x0) r18 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r18, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r19 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r19, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r20 = open$dir(&(0x7f0000002a40)='./file0\x00', 0x10000, 0x8) r21 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r21, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r22 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r23 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r23, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r24 = gettid() ptrace$setopts(0x4206, r24, 0x0, 0x0) tkill(r24, 0x1e) lstat(&(0x7f0000002a80)='./file0\x00', &(0x7f0000002ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r26}], {}, [{0x8, 0xd, r27}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) sendmsg$unix(r4, &(0x7f0000002c40)={&(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="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", 0x1000}], 0x2, &(0x7f0000002b40)=[@cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r11, r13}}}, @rights={{0x30, 0x1, 0x1, [r14, r15, r16, r0, r17, 0xffffffffffffffff, r1, r18]}}, @rights={{0x18, 0x1, 0x1, [r19, r20]}}, @rights={{0x20, 0x1, 0x1, [r21, 0xffffffffffffffff, r22, r23]}}, @cred={{0x1c, 0x1, 0x2, {r24, r25, r27}}}], 0x100, 0x440480e1}, 0x10000000) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in={0x2, 0x4e23, @rand_addr=0x1ff}}}, 0x90) r28 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x505001, 0x0) ioctl$DRM_IOCTL_AGP_FREE(r28, 0x40206435, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x8}) [ 630.402421] EXT4-fs: 2 callbacks suppressed [ 630.402432] EXT4-fs (sda1): re-mounted. Opts: 03:37:42 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x01\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x2, 0x1}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000040)={0x0, r4}) r5 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r5, 0x40045542, &(0x7f0000000100)=0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r6, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) [ 630.518735] EXT4-fs (sda1): re-mounted. Opts: 03:37:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r3}], {}, [{0x8, 0xd, r4}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x1e) r6 = syz_open_procfs(r5, &(0x7f00000003c0)='net/netstat\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r10 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000440)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r11 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r11, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r12 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r13, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000050000000000000000000000ffffffff010000001900000000000000000076657461315f746f5f0400000000000065727370626e300000000000000000006272696466655f736c6176655f31000069653e841901e50ac9000000000000000180c2000000000000000000aaaabfaaaa000000000000000000d4000000d40000001c010000636c757374e57200000000000000002000000000000000000000000000000000000000000000008e8300000000000000000000007265616c6d0000000000000000000000000000000000000000008000000000000c0000000000000000000000000000006c6f67000000000000000000000000000000000000000000000000000000000024000000004608fdc2eedaf8ff6fcbc6a67ee31e6bfa4cf9f0761ffdac96c7d300bc1d000000000000000000000000000000080000000000000000000000000000000000000000000000000001000000feffffff00000000"]}, 0x224) r14 = gettid() r15 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r16) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)={0x0, 0x0}) r18 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r19) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r15, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r20}], {}, [{0x8, 0xd, r21}, {0x8, 0x0, r4}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) r22 = gettid() ptrace$setopts(0x4206, r22, 0x0, 0x0) tkill(r22, 0x1e) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r24) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r25}], {}, [{0x8, 0xd, r26}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) r27 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r27, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) fcntl$getownex(r27, 0x10, &(0x7f00000004c0)={0x0, 0x0}) r29 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r29, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r30) r31 = getgid() getresuid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r33}], {}, [{0x8, 0xd, r34}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r35}], {}, [{0x8, 0xd, r36}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2ee712874a06b5c4c922df4e8f414c1e075f611753145b4d2b0a3f56ef42600c91d2237bacc62babcf68a4d57896f0a6c1e754f7f06df8aee0fb99a5582d48b768405c4c75f654321ecae478e392f90141d3729ab26ba988fe766ca7ddca94f6edefa631187eaca6f17a98057b546f0f5602885ea094f76d81c862871378a7c5e030a227ead5e9f399d9ec3ff0107d6705ecf4ac872ea8f9065326fdf24d96355282625a8585b4d1f595c681b7f5052e7ed61679a953fe3bc1555b9105c4cdea436450731b9fe7b1a909435790fd3a529a6c82db1c236ca23dbc290d942a084cf7", 0xe1}], 0x1, &(0x7f00000005c0)=[@cred={{0x1c, 0x1, 0x2, {r0, r2, r4}}}, @rights={{0x28, 0x1, 0x1, [r6, r9, r10, r11, r12, r13]}}, @cred={{0x1c, 0x1, 0x2, {r14, r16, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r17, r19, r21}}}, @cred={{0x1c, 0x1, 0x2, {r22, r24, r26}}}, @cred={{0x1c, 0x1, 0x2, {r28, r30, r31}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r32, r36}}}], 0xc0, 0xe094}], 0x1, 0x4040010) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) 03:37:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000040)={{0x2, 0x4e24, @empty}, {0x60b, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}, 'syzkaller0\x00'}) 03:37:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @dev}, &(0x7f0000000080)=0xc) r2 = syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0xaa, 0x1) fgetxattr(r2, &(0x7f0000000280)=@random={'security.', '}]+:\x00'}, &(0x7f00000002c0)=""/70, 0x46) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@bridge_delneigh={0x94, 0x1d, 0x20, 0x70bd2c, 0x25dfdbfe, {0x7, 0x0, 0x0, r1, 0x4, 0x1, 0xc}, [@NDA_DST_IPV6={0x14, 0x1, @remote}, @NDA_VNI={0x8, 0x7, 0xa3}, @NDA_VLAN={0x8, 0x5, 0x2}, @NDA_DST_IPV6={0x14, 0x1, @mcast1}, @NDA_LINK_NETNSID={0x8, 0xa, 0x1}, @NDA_CACHEINFO={0x14, 0x3, {0x20, 0x6, 0xfe, 0x1}}, @NDA_MASTER={0x8}, @NDA_SRC_VNI={0x0, 0xb, 0xffff}, @NDA_DST_MAC={0xc, 0x1, @link_local}, @NDA_MASTER={0x296, 0x9, 0xfffffdec}]}, 0x94}, 0x1, 0x0, 0x0, 0x8000}, 0x20044005) 03:37:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = epoll_create1(0x100000) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) ioctl$FICLONE(r0, 0x40049409, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) 03:37:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000000c0)={0x0, 0x7, 0x10000, 0x4, 0x6, 0x7}) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x80, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r5, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r6, r4}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x3, r6, 0x30, 0x2, @ib={0x1b, 0x2, 0x5, {"78ec79503c840eacf3feef27b3db7e5d"}, 0x786ebf6, 0x5, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='\x00', 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000000)={0x4, 0x0, 0x4, 0x1, '\x00', 0x80000000}) [ 631.094342] EXT4-fs (sda1): re-mounted. Opts: 03:37:43 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x03\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="020026bd7000fedb01251000000054000300080208008100000014000200696662300000000000000000000000000800050000000000080003000100000008000300020000001400060002000000000000000000ffff000000000800030000000000"], 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x10808) 03:37:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x401, 0x180402) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0xffffffffffffff83) 03:37:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r0, r1/1000+10000}}) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) getpeername(r2, &(0x7f0000000100)=@can, &(0x7f0000000180)=0x80) 03:37:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0]}, &(0x7f000095dffc)=0xffffffffffffff2a) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)={r4, 0x38, "eecf48647450963adeef5ae082403e5b6948b8e035efb7520a965c37c873b30b1ce0deeabac940839533a0d14f607f5711af9a23c2e32320"}, &(0x7f0000000300)=0x40) r5 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') setsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000000)={0x8, 0x40, 0x8, 0x4, 0x6, 0x58, 0x36, 0x76, 0x20, 0x1, 0x1d}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) [ 631.354606] EXT4-fs (sda1): re-mounted. Opts: 03:37:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x7, 0x7, 0x1, 0xba}) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000000)) 03:37:43 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x04\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x0}) setitimer(0x4, &(0x7f00000002c0)={{0x0, 0x2710}, {r4, r5/1000+10000}}, 0x0) r6 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)={0x1, [0x0]}) ioctl$int_in(r6, 0xfc10, &(0x7f0000000140)=0x64cb) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 03:37:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x80) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f00000000c0)=r3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r2, 0x4b, "8d1d8c", "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"}}, 0x110) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0xfffffffffffffdc1) 03:37:44 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\xff\xff\xff\xf6\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) [ 632.048854] EXT4-fs (sda1): re-mounted. Opts: 03:37:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x400000) connect$caif(r0, &(0x7f0000000080)=@dgm={0x25, 0x5, 0x45}, 0x18) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}, @in={0x2, 0x0, @remote}], 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}], 0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={r3, 0x38, "eecf48647450963adeef5ae082403e5b6948b8e035efb7520a965c37c873b30b1ce0deeabac940839533a0d14f607f5711af9a23c2e32320"}, &(0x7f0000000300)=0x40) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x3ff}, 0x90) 03:37:44 executing program 3: write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) dup(r2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) 03:37:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r2 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:44 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\xff\xff\xff\xfe\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:44 executing program 3: prctl$PR_SVE_GET_VL(0x33, 0x8445) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\x95m\x91\xbe\xcev\xdb\xab\xe8\x99<\xeb^\xc4\x8e\xa0\xa40\xbb\xcf\x8e\x95^\xd8ZJ5z\xa7Q\xef\xc0\xf6\xdfg\x115<\xec,|S\x81}\x8b\xfa\xe7\xdb\xe3T\xf0\xb9.\xdd\xa0\b\xf6A\xfc\x96\x94F\xc5', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x400000, 0x0) flock(r3, 0xf) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x44080, 0x0) ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000380)=""/157) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r5 = syz_init_net_socket$x25(0x9, 0x5, 0x0) accept4(r5, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000000c0)=0x80, 0x400) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) 03:37:45 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\xf6\xff\xff\xff\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) [ 632.717638] cgroup: fork rejected by pids controller in /syz2 03:37:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xfffffffffffffebc, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)='ramfs\x00', r0}, 0x30) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write$evdev(r1, &(0x7f0000000140)=[{{}, 0xaada8ffceee305fd, 0xfff, 0x4}, {{0x0, 0x7530}, 0x1c, 0x4, 0x2db}, {{0x0, 0x2710}, 0x14, 0x1, 0xab}], 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000040)='selinux:GPL/-lotrustedem1\x00', r0}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e6, 0x0, @perf_config_ext={0x4}}, r2, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:45 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x200800, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) 03:37:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x9}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002c40)=[{{&(0x7f0000000040)=@isdn, 0x80, &(0x7f0000001380)=[{&(0x7f00000000c0)=""/253, 0xfd}, {&(0x7f0000000240)=""/100, 0x64}, {&(0x7f00000002c0)}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000340)=""/36, 0x24}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x6}, 0x3f}, {{&(0x7f0000001400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000001480)=""/9, 0x9}, {&(0x7f00000014c0)=""/131, 0x83}, {&(0x7f0000001580)=""/226, 0xe2}, {&(0x7f0000001680)=""/149, 0x95}], 0x4}, 0x8}, {{&(0x7f0000001780)=@l2, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000001800)=""/253, 0xfd}, {&(0x7f0000001900)=""/93, 0x5d}, {&(0x7f0000001980)=""/183, 0xb7}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000002a40)=""/113, 0x71}], 0x5, &(0x7f0000002b40)=""/225, 0xe1}, 0x1}], 0x3, 0x2040, &(0x7f0000002d00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) 03:37:45 executing program 3: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) write$binfmt_misc(r0, &(0x7f0000000100)={'syz0', "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"}, 0x1004) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:45 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x02\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000001400)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000001540)=0xe8) syz_mount_image$iso9660(&(0x7f0000000280)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x1f, 0x1, &(0x7f0000001380)=[{&(0x7f0000000380)="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", 0x1000, 0x7}], 0x819d370fe50a4739, &(0x7f0000001580)={[{@session={'session', 0x3d, 0x3f}}], [{@permit_directio='permit_directio'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'em1@vmnet1'}}, {@uid_gt={'uid>', r0}}, {@euid_lt={'euid<', r1}}, {@uid_eq={'uid'}}]}) select(0x40, &(0x7f0000000040)={0x8, 0x2, 0x2, 0x2, 0x7, 0x6, 0x10000, 0x6}, &(0x7f0000000080)={0x544, 0x0, 0x4, 0x3f, 0x9, 0x0, 0x4, 0x353}, &(0x7f00000000c0)={0x4, 0x1, 0x2, 0x100000001, 0xff, 0x7a75, 0x8, 0x4}, &(0x7f0000000100)={0x77359400}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000050000000000000000000000ffffffff010000001900000000000000000076657461315f746f5f0400000000000065727370626e300000000000000000006272696466655f736c6176655f31000069653e841901e50ac9000000000000000180c2000000000000000000aaaabfaaaa000000000000000000d4000000d40000001c010000636c757374e5720000000000000000200000000000000095ee6a43e8cca146000000000000000000000000000000008e8300000000000000000000007265616c6d0000000000000000000000000000000000000000008000000000000c0000000000000000000000000000006c6f67000000000000000000000000000000000000000000000000000000000024000000004608fdc2eedaf8ff6fcbc6a67ee31e6bfa4cf9f0761ffdac96c7d300bc1d000000000000000000000000000000080000000000000000000000000000000000000000000000000001000000"]}, 0x224) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000001640)=""/20, &(0x7f0000001680)=0x14) setsockopt$sock_timeval(r2, 0x1, 0x43, &(0x7f0000000140), 0x10) 03:37:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) r2 = syz_open_procfs(r1, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x2e}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) 03:37:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r2 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) 03:37:46 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x04\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x3, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000540)={'ip6gretap0\x00', 0x20, 0x41}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xff, 0x40, 0x4, 0x5}, {0x7fff, 0x0, 0x1f, 0x101}, {0x7ff, 0x4, 0x4, 0x3f}]}) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000780)='user\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f00000006c0)="ff", 0x1, r1) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='updatv default trusted:V^\x00'], 0x1a, r2) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x200a00, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r4, 0x10e, 0x8, &(0x7f00000002c0)=0x400, 0x4) getpeername$inet(r3, &(0x7f0000000180)={0x2, 0x0, @initdev}, &(0x7f0000000240)=0x10) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x276, 0x0, 0x2045012, 0x0) 03:37:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x10000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="2000000065d513a0b39c5df1262e91328c6c5b74caf265952b35e200b24c6e8f074bb69ad99a53d640499e000cc988f766338fef8366", @ANYRES16=r2, @ANYBLOB="7b460000000000000000110000000c00090008000100fcffffffc9c639a82dd1aa5a545e177bbf27ae8855dbfad23745b29e1f92be3b0270f6323e97581b91e518b068c344fc28608bc1b435f99449b3a7c353f6fc086df4eb43844a4ba20cf05b40b678a1c86369b0db14560a37cd0a33f118be7e8504287ef2620064373916e2df8341acd59a15eb16fca3a8209d6d1c6b321c43bce25626b589c839485556839249dcf9"], 0x20}}, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00012abd7000fbdbdf25120002004400090008000100ffffff00000001f401000000080001000100000008000200d20d000008000200b503000008000100f700000008000100177300000800020008000000"], 0x58}, 0x1, 0x0, 0x0, 0x20000054}, 0x84000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) r2 = syz_open_procfs(r1, &(0x7f0000000800)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x5, 0xfa00, {0x1000003, 0x0, 0x13f, 0x14}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,}+:G\x1bJ}\xb7\xf3\xfe\xf6\x8a.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x05\x00\x00\x00\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r3 = dup3(r2, r0, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000040)={0x57, 0x3ff, 0xa, {0x0, 0xbffa}, {0x400, 0x8}, @rumble={0x1, 0x8}}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0) perf_event_open(&(0x7f000001d000)={0xe, 0xfffffffffffffed9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, r1, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) 03:37:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000500)={"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"}) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r2 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:47 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@ng={0x4, 0x3, "efda6ff1d0"}, 0x7, 0x2) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) [ 635.451002] EXT4-fs: 12 callbacks suppressed [ 635.451030] EXT4-fs (sda1): re-mounted. Opts: 03:37:47 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xa02100, 0x0) sync_file_range(r0, 0x0, 0x10000000000000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3', '/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4'], 0x376, [], [0xa000, 0x1, 0x4, 0x2]}) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:48 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x03[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0xa0008, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e23,sq=0x0000000E00000001,timeout=0x0000000000000006,subj_type=security,,\x00']) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x220800, 0x1c1) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) 03:37:48 executing program 0: ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)={0x2, [0x80000000, 0xb8, 0x20, 0xbde, 0x80000000]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000280)="f8850bb00566193e4fa78aa8b5899bb1bf6644edc8df8ae51d9f1fab68abe5b37614f67ac7398a7593187a965c6c53e17e081a1c30ef8babb2a42d56918736f1a974bc61e88f7f1f91f159279cb56ef6f75e01983c81a0dc38efaf22939cf43cd31ff381ed389d92254200385d9dcefef6", 0x71}, {&(0x7f0000000300)="2a7137db2b0d2f55e08d7cf84f735dbe9c3111ce04358469fa3ed7e353f052bad4baf976a93917572c0da85726c1a8ebcbecb385b3482cffbe1e0e3d283f6a88e1c0ca09ef7e412bf8aa63a73e9f748eb62db612a9763cc7d79bae084c0ecb1ee6ac346cb83592498eda4f995571c69a4a8882b7d070742e2d384e21ecadc2f2c7a5e880bcf8f474e90819130e488b7b42e78c56e210feeada16", 0x9a}], 0x2, &(0x7f00000003c0), 0x0, 0x24050025}, 0x8000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) write$smack_current(r0, &(0x7f0000000100)='@eth0md5sum:s\blf$vmnet1\x00T\xd5\xe4!\xcd\a\x1eq\xd6\x1b\x03\xddj\x05\xf6\x1d\xdf\"^n\x92\xc3_\xe8\xc4\x8c\x1d\xc0\xd5\x8e\xf8V<\x7f\xb5\x1f\x14=\"\xb8\x85z\xafU\v\x1cS\x89v\xab\x01\x84\xcdwY\xcf\xdf\x9c\xf4f\x05\x1cQ\f\xc0\xa68\r0\xf5\x13`?\xf4\xde\xc5\xd9H\x92\r5\xd2b\x99\xb1\xd6U\xa0\xcepj\xeb\x9e\xd5\x18\xd1j\xc2=\xab\x933\xeb\xf2\r\x82e&\xb0\xa2\x97\xa3\v\x92s\x1eexW\xce\xa6x\x96Y\x1d\xce\x11Q\"-\rk\xfa*\xcd+k\x81\x1fA\xb2\xa4\r\xef\xf6\xd9\xd6*%\x94 \xfb7~\xed\x0f\xb6\x86\xddi2$\xbe\xd2\xd5\x99-<\xe2U\xbe\xf9\x8b\xa9\xf4\xa8\x92\xe1\xc6]\xc6', 0xcd) 03:37:48 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x04[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(0xffffffffffffffff, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r2 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xfffffffffffffebc, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)='ramfs\x00', r2}, 0x30) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r2}, 0xc) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x1e) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:48 executing program 0: setsockopt(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000000)="e484573146fedaec23b94d68e2d02de1b2533a632745229d17666fa31709256b79aacfb428e748d415d829a3d58746d7c6d04455ef294fa4de12aca0d2", 0x3d) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) 03:37:48 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00kkk[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000050000000000000000000000ffffffff010000001900000000000000000076657461315f746f5f0400000000000065727370626e300000000000000000006272696466655f736c6176655f31000069653e841901e50ac9000000000000000180c2000000000000000000aaaabfaaaa000000000000000000d4000000d40000001c010000636c757374e57200000000000000002000000000000000000000000000000000000000000000008e8300000000000000000000007265616c6d0000000000000000000000000000000000000000008000000000000c0000000000000000000000000000006c6f67000000000000000000000000000000000000000000000000000000000024000000004608fdc2eedaf8ff6fcbc6a67ee31e6bfa4cf9f0761ffdac96c7d300bc1d000000000000000000000000000000080000000000000000000000000000000000000000000000000001000000feffffff00000000"]}, 0x224) r2 = accept4(r1, &(0x7f00000000c0)=@rc, &(0x7f0000000040)=0x80, 0x80400) accept$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0x1c) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x2, @broadcast, 'eql\x00'}}) syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000140)={0x9, 0x15d, 0xfa00, {0xffffffffffffffff, 0x8, "003b97", "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"}}, 0xffffffffffffff70) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 03:37:48 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x200002, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000000)={0x5, 0x3, 'client0\x00', 0x7, "060b0818f11fbad9", "b281af3cd5ded135eda5bea63f10486dd1e5042fee071543984c056865f29ea3", 0x0, 0x3}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r1, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x8c1001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40800000000000}, 0x0, 0x0, 0x0, 0x16, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000540)={{0x3, 0x49ead1475b46f2b6, 0x1, 0x80000000}, 0x5, 0x200, 0xc92, r4, 0x2, 0x10000, 'syz1\x00', &(0x7f00000001c0)=['fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000140)={0x9, 0xfffffffffffffe94, 0xfa00, {r3, 0x0, 'oZn', "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"}}, 0xfffffd47) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000300)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000400)=0xe8) setuid(r4) [ 636.837148] EXT4-fs (sda1): re-mounted. Opts: 03:37:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@v1={0x2, "6c07390dd76ada5b38fa22e317b3cbff6ab08374"}, 0x15, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) 03:37:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) r2 = syz_open_procfs(r1, &(0x7f0000000800)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:49 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\xf6\xff\xff\xff[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:49 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r0, 0x0, 0x40000, 0x4) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) readv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r2 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) [ 637.169314] EXT4-fs (sda1): re-mounted. Opts: [ 637.237388] EXT4-fs (sda1): re-mounted. Opts: 03:37:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f0000000280)={r4, 0x10}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:49 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\xfe\xff\xff\xff[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x359, 0xfa00, {0xffffffffffffffff, 0x0, "00e0ff", "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482d8d850300"}}, 0x198) 03:37:49 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r0, 0x0, 0x40000, 0x4) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) readv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r2 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}, @in={0x2, 0x0, @remote}], 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}], 0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000200)={r6, 0x38, "eecf48647450963adeef5ae082403e5b6948b8e035efb7520a965c37c873b30b1ce0deeabac940839533a0d14f607f5711af9a23c2e32320"}, &(0x7f0000000300)=0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000001640)={r6, @in6={{0xa, 0x4e22, 0x4, @empty, 0x101}}, [0x1f, 0x0, 0x1f, 0x8, 0x10001, 0x7f, 0x7, 0xcb, 0x6, 0x80000001, 0x4, 0x5, 0x6, 0x1, 0x9]}, &(0x7f0000001740)=0x100) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}], 0x10) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)={r8, 0x38, "eecf48647450963adeef5ae082403e5b6948b8e035efb7520a965c37c873b30b1ce0deeabac940839533a0d14f607f5711af9a23c2e32320"}, &(0x7f0000000300)=0x40) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r8, @in={{0x2, 0x4e21, @empty}}, 0x20, 0xf801}, &(0x7f0000000180)=0x90) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, r9) r11 = socket$inet6_sctp(0xa, 0x1, 0x84) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x200, 0x0) getsockopt$inet6_dccp_buf(r12, 0x21, 0xc0, &(0x7f0000000540)=""/4096, &(0x7f0000001540)=0x1000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}, @in={0x2, 0x0, @remote}], 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r11, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}], 0x10) r13 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r11, 0x84, 0x6d, &(0x7f0000000200)={r14, 0x38, "eecf48647450963adeef5ae082403e5b6948b8e035efb7520a965c37c873b30b1ce0deeabac940839533a0d14f607f5711af9a23c2e32320"}, &(0x7f0000000300)=0x40) getsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r14, &(0x7f0000000240)=0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r15, 0xee0}, 0x8) write$capi20_data(r0, &(0x7f0000001580)=ANY=[@ANYBLOB="100085978773060002000000000000002e00fd9515074e249bd0b9cd9eaced0df042a10a4696b95bc5041bc59e893c211d8dd2670ca2e0af1410e01226c06ec2bd6bc3f1f1f24698ecf9d922c1827af09b2bbdb000b56e22dbe55cf44a3a43628f8cf321f873493d253d16df04f82d54aaa934d40c837a93ef8c5072280d664885d73d7d3404e1b7870043635f928a"], 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r16 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) write$smack_current(r16, &(0x7f0000000000)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:49 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x02\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) [ 637.654922] sctp: [Deprecated]: syz-executor.3 (pid 24544) Use of int in maxseg socket option. [ 637.654922] Use struct sctp_assoc_value instead 03:37:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:50 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x03\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:50 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x200) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000040)={0x2, 0x4, 0x1}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) [ 637.802393] sctp: [Deprecated]: syz-executor.3 (pid 24658) Use of int in maxseg socket option. [ 637.802393] Use struct sctp_assoc_value instead 03:37:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cput.sta\xee\xbc\xf8MRW\xe3\xc0\xac\xee8\x90\xd3\xc4\xb3c\xae\x89^%Sa_\xd5\xea5\xa8zS<\xcd;\xdaq\'|\xc2\xf5\xadJpJ\xb8\xf8\xdaP\xff\x01o*V\xa2\xb7\x8c\xa6R\x0e\r4U\xdd\xba\xcb5jtZ\x95\t\xff\xf8=\x88\x8e\xf9\xe7A1\xfd\xb5\xfa\xc3\xd1o\x15\xc6.\x1f~4\xb6\x95\xabe?\x89>\xd18[i\x7f\xdd#\xdc\xdbh\x1e\x13Y\x8fK\x81\x13n$\x88\x95L\xc6a\xfe\x96\xddI:S\x1b\xad|\x02g=', 0x2761, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x452082, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x101100, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000100)=0xc) ioctl$TUNSETOWNER(r0, 0x400454cc, 0xee00) fchown(r1, r5, 0xee01) write$smack_current(r3, &(0x7f00000000c0)='\x00', 0x1) 03:37:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:50 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x04\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$IMGETCOUNT(0xffffffffffffffff, 0x80044943, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f0000000100)={0x8, 0x0, 0x4194, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h \xcdi\xca\xb9+\x00'}) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r5, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r6, r4}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000140)={0x9, 0xfffffffffffffdfd, 0xfa00, {r6, 0x0, "90001f", "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"}}, 0x207) 03:37:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinu\\/enforce\x00', 0x60040, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000040)=0x8) 03:37:50 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x8803, 0x0) r1 = accept4$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000140)='k-\x00', 0x3, 0x2) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='_percpu_sys\x00', 0x2761, 0x0) write$smack_current(r2, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:50 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x03\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.stat\x00', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x86\xbb\x05\xcf:$\x87Xu\xaaN\x19\xcd\x8f\xde\xb2>\x8bUDW@\x8b', 0xc) 03:37:51 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x02\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:51 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "0100a8", "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"}}, 0x110) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x295) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f00000000c0)=0x54) 03:37:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000001780)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="42794b70080000005345204c696e75782e00000000f400000600000007000000"], 0x20) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) 03:37:51 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x03\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "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"}}, 0x110) 03:37:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) [ 638.975687] SELinux: policydb magic number 0x704b7942 does not match expected magic number 0xf97cff8c [ 639.014348] SELinux: failed to load policy [ 639.040989] SELinux: policydb magic number 0x704b7942 does not match expected magic number 0xf97cff8c [ 639.117485] SELinux: failed to load policy 03:37:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000)=0x3fa9, 0x4) 03:37:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95lB\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r3, r1}}, 0x18) preadv(r2, &(0x7f00000017c0), 0x1a4, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x4, 0x400000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001680)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000001700)={0x14, 0x88, 0xfa00, {r5, 0x1c, 0x0, @in={0x2, 0x4e23, @multicast1}}}, 0x90) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000001600)=@broute={'broute\x00', 0x20, 0x4, 0xdc8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, &(0x7f0000000300), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0xe40) 03:37:51 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x04\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000002c0)=""/30, &(0x7f0000000380)=0x1e) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x7, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000000)={0x5, 0x76fa1443, 0x59, 0x3ff, 0x4, 0x7aff}) r2 = getpgid(0xffffffffffffffff) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0xffffe630, 0x769e8019, 0xfff, 0x5, 0x198}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) kcmp(0x0, r2, 0x6, r4, r0) write$smack_current(r1, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) r5 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$PPPIOCATTCHAN(r5, 0x40047438, &(0x7f0000000100)=0x3) 03:37:51 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x03[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, 'oZn', "97b896c6f19d7112a772a41dc676d38373e04e496c0b5d4bca2934bc6143c9f1ba093566ac44230b4f0542238a211c72c35911d2af04bb4ed224ce3700c9f836360b7191647654ab95ff01899b92f029a68fb0e49e8c7b00939ba0b9a83fb49550339b5aea03a7f5c2e63d87d8d1192c230c8c14a0e3202a847715e416f0ccb42f7b8ea5e5f910f38704e91badcfe1eb8a95b911c983c334a7225091621c22679a35b088011d1476e7e6f97e28484cfe80dabf74de48b06d06b463d2ea12d29cd716bfa746abc8a82dd2d14f2acca4a46f2e230a8e81691768b633573eee91fc142b553295297614ab037920a1b6a31684ba482dd9e2af656f069521368d8503"}}, 0x110) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000200)={r6, 0x38, "eecf48647450963adeef5ae082403e5b6948b8e035efb7520a965c37c873b30b1ce0deeabac940839533a0d14f607f5711af9a23c2e32320"}, &(0x7f0000000300)=0x40) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000000)={r6, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000000c0)={r7, 0x3aca322d}, &(0x7f0000000100)=0x8) 03:37:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f0000000100)=')proc{posix_acl_accesslo\x00', 0x184c11ee68791884) fcntl$setsig(r0, 0xa, 0x25) 03:37:52 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x02[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) 03:37:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:37:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x2761, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x220600) pipe2(&(0x7f0000000100), 0x4000) write$smack_current(r0, &(0x7f0000000240)='\\selfem0].)/selinux\x00', 0x14) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87\x80\xbeh\x9a\x11\xe3\x1c*\xc2\xa4\x01\x13Q\x84\x8c@\x19\xb0\xd7\x82\xc6\xe4\x96\x9a\xa9\xad\xaf\xeev\xc1\xf1\b&\x05\x1co\xee\xafQG\xed\xd2\x93\xa6\x81\xd3\f\xdcw\xf0\x01\xdee\xbb\xae\x7f\xa5KZ\xfe\x88\x9c\xa6T\xa1\x8f\xf4q\xbf\xaa\xe4]oy~\xe8\x89\x9e\x92\x94E\x1c\xd7\xd4$\x99\xf19\xa5\xc7H\x0f\nb\xb8\x82\xf4\x97\xd2\x10\xf3[\xadc\xe0\"\xe5\xb3\f\x7f\xda\"\xe7}\xedk,4\xf1\x15\xa9\xdd\xac\x7fb\xbd%?\x0e\xe3\xb9Y&\x14\xfe\x1d\xc9X@\x85LN+\x7f\xd5\xf1\xf2}$\xc96A\xe8\xa6 S\xcd\x17\xb7\xd3') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r5, r3}}, 0x18) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @multicast1, 0x0, 0x4343}, 0x5000) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r10, 0x0, 'oZn', "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"}}, 0x110) 03:37:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$smack_current(r0, &(0x7f00000000c0)='!eth0md5sum:self$vmnet1\x00', 0x18) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x2) 03:37:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = geteuid() stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r1}], {}, [{0x8, 0xd, r2}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) stat(0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r5}], {}, [{0x8, 0xd, r6}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r7}], {}, [{0x8, 0xd, r8}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) getresgid(&(0x7f0000000180)=0x0, &(0x7f0000000240), &(0x7f0000000280)) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r10}], {}, [{0x8, 0xd, r11}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r12}], {}, [{0x8, 0xd, r13}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r14}], {}, [{0x8, 0xd, r15}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0xa}, [{0x2, 0x7, r17}], {}, [{0x8, 0xd, r18}, {}, {0x8, 0x2}, {0x8, 0x4}]}, 0x4c, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x5}, [{0x2, 0x2, r0}], {0x4, 0x2}, [{0x8, 0x6, r2}, {0x8, 0x1, r4}, {0x8, 0x2, r6}, {0x8, 0x0, r8}, {0x8, 0x2, r9}, {0x8, 0x2, r11}, {0x8, 0x0, r13}, {0x8, 0x6, r15}, {0x8, 0x0, r16}, {0x8, 0x4, r18}], {0x10, 0x3}, {0x20, 0x1}}, 0x7c, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) [ 640.076303] BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 [ 640.084303] PGD 8f6b2067 P4D 8f6b2067 PUD 75122067 PMD 0 [ 640.089848] Oops: 0010 [#1] PREEMPT SMP KASAN [ 640.094343] CPU: 0 PID: 25513 Comm: syz-executor.3 Not tainted 4.19.78 #0 [ 640.101268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.110627] RIP: 0010: (null) [ 640.114522] Code: Bad RIP value. [ 640.117888] RSP: 0018:ffff8880636579f0 EFLAGS: 00010246 [ 640.123251] RAX: ffffffff875b0f20 RBX: 0000000000000000 RCX: 0000000000000018 [ 640.130518] RDX: 0000000000000000 RSI: ffff888078b5c630 RDI: ffff8880a0847000 [ 640.137789] RBP: ffff888063657b08 R08: 0000000000000000 R09: ffff888063657a80 [ 640.145055] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000018 [ 640.152328] R13: ffff888063657ae0 R14: ffff888063657d48 R15: ffff888078b5c630 [ 640.159603] FS: 00007fe3a0b15700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 640.167835] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 640.173710] CR2: ffffffffffffffd6 CR3: 000000009780a000 CR4: 00000000001406f0 [ 640.180980] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 640.188256] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 640.195525] Call Trace: [ 640.198122] generic_perform_write+0x22a/0x520 [ 640.202720] ? page_endio+0x780/0x780 [ 640.206524] ? current_time+0x140/0x140 [ 640.210498] ? lock_acquire+0x16f/0x3f0 [ 640.214475] ? ext4_file_write_iter+0x23f/0x1060 [ 640.219235] __generic_file_write_iter+0x25e/0x630 [ 640.224193] ext4_file_write_iter+0x32b/0x1060 [ 640.228896] ? mark_held_locks+0x100/0x100 [ 640.233140] ? ext4_file_mmap+0x410/0x410 [ 640.237421] ? mark_held_locks+0x100/0x100 [ 640.241690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 640.247326] ? iov_iter_init+0xc6/0x1f0 [ 640.251310] __vfs_write+0x587/0x810 [ 640.255026] ? kernel_read+0x120/0x120 [ 640.258925] ? rcu_read_lock_sched_held+0x110/0x130 [ 640.263945] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 640.268715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 640.274267] ? __sb_start_write+0x1a9/0x360 [ 640.278623] vfs_write+0x20c/0x560 [ 640.282178] ksys_write+0x14f/0x2d0 [ 640.285817] ? __ia32_sys_read+0xb0/0xb0 [ 640.289910] ? do_syscall_64+0x26/0x620 [ 640.293920] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.299290] ? do_syscall_64+0x26/0x620 [ 640.303285] __x64_sys_write+0x73/0xb0 [ 640.307440] do_syscall_64+0xfd/0x620 [ 640.311246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.316439] RIP: 0033:0x459a59 [ 640.319633] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 640.338622] RSP: 002b:00007fe3a0b14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 640.346335] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 640.353611] RDX: 0000000000000018 RSI: 00000000200000c0 RDI: 0000000000000003 [ 640.360885] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 640.368164] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe3a0b156d4 03:37:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) [ 640.375559] R13: 00000000004c9fc5 R14: 00000000004e1c58 R15: 00000000ffffffff [ 640.382830] Modules linked in: [ 640.386027] CR2: 0000000000000000 [ 640.396350] ---[ end trace 367b7440de6f1704 ]--- [ 640.401849] RIP: 0010: (null) [ 640.408657] kobject: 'loop2' (00000000ac17210e): kobject_uevent_env [ 640.419569] Code: Bad RIP value. [ 640.427258] kobject: 'loop2' (00000000ac17210e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 640.437317] kobject: 'loop5' (000000008be9f1fc): kobject_uevent_env [ 640.443850] kobject: 'loop5' (000000008be9f1fc): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 640.459205] RSP: 0018:ffff8880636579f0 EFLAGS: 00010246 [ 640.464904] RAX: ffffffff875b0f20 RBX: 0000000000000000 RCX: 0000000000000018 [ 640.493013] RDX: 0000000000000000 RSI: ffff888078b5c630 RDI: ffff8880a0847000 [ 640.504208] EXT4-fs (sda1): re-mounted. Opts: [ 640.528179] RBP: ffff888063657b08 R08: 0000000000000000 R09: ffff888063657a80 03:37:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, 0x0, 0x100032, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x1ac, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x224) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 03:37:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r3 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0x0) execveat(r3, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) [ 640.541332] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000018 [ 640.557124] kobject: 'loop5' (000000008be9f1fc): kobject_uevent_env [ 640.565187] kobject: 'loop5' (000000008be9f1fc): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 640.569063] R13: ffff888063657ae0 R14: ffff888063657d48 R15: ffff888078b5c630 [ 640.629325] FS: 00007fe3a0b15700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 640.638936] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 640.647942] kobject: 'loop2' (00000000ac17210e): kobject_uevent_env [ 640.663013] CR2: 00007ffdc4141d8c CR3: 000000009780a000 CR4: 00000000001406f0 [ 640.672460] kobject: 'loop2' (00000000ac17210e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 640.685790] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 640.699483] kobject: 'loop5' (000000008be9f1fc): kobject_uevent_env [ 640.706452] kobject: 'loop5' (000000008be9f1fc): kobject_uevent_env [ 640.715831] kobject: 'loop5' (000000008be9f1fc): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 640.725821] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 640.727076] kobject: 'loop5' (000000008be9f1fc): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 640.744162] Kernel panic - not syncing: Fatal exception [ 640.750305] Kernel Offset: disabled [ 640.753928] Rebooting in 86400 seconds..